Search Results - (( java application mining algorithm ) OR ( control identification based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Practical implications – The identification algorithm is expected to facilitate the required model development for model-based control design for autonomous helicopter development. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8
  9. 9

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The Quadrotor controller is designed such that it can be controlled using both the attitude control (inner loop) and position control (outer loop). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    System identification of PFC rectifier controller using non-linear autoregressive moving average with exogenous inputs (NARMAX) model / Mohd Benyamin Sabtu by Sabtu, Mohd Benyamin

    Published 2010
    “…The tests that been performed based on the PFC Rectifier Controller dataset, show that the OLS has the potential to become an effective method to determine the NARMAX model structure in the system identification model.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Identification and control of a small-scale helicopter by Deboucha, A., Taha, Z.

    Published 2010
    “…This identification process is based on the well-known gradient descent learning algorithm. …”
    Get full text
    Article
  12. 12

    False path identification algorithm framework for nonseparable controller-data path circuits by Shaheen, Ateeq U. R., Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    False path identification algorithm framework for nonseparable controller-data path circuits by Shaheen, A.-U.-R., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
    Get full text
    Get full text
    Article
  14. 14

    Grouping based radio frequency identification anti-collision protocols for dense internet of things application by Umelo, Nnamdi H., Noordin, Nor K., A. Rasid, Mohd Fadlee, Geok, Tan K., Hashim, Fazirulhisyam

    Published 2022
    “…The results also demonstrate FCMBG bettered other grouping-based algorithms (GB-DFSA and GBSA) whose tag estimation method are based on collision slots in terms slot efficiency by over 10% and also in terms of identification time.…”
    Get full text
    Get full text
    Article
  15. 15

    The efficiency of detecting the failures and troubleshooting while applying technical diagnostics for multi-computer systems by Ye, K.Z., Kyaw, H.A., Portnov, E.M., Bain, A.M., Vasant, P.

    Published 2015
    “…This paper presents techniques which base on the concept of flows thinning together with the identification techniques. …”
    Get full text
    Get full text
    Article
  16. 16

    Fast-varying flicker mitigation using D-statcom and its identification / Nur Fadhilah Jamaludin by Jamaludin, Nur Fadhilah

    Published 2015
    “…In this study, it is found that the proposed new control algorithm for D-STATCOM based on PLL controller together with HCC switching has been able to produce a better result as compared to the previous techniques in term of time response. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Improvement of Auto-Tracking Mobile Robot based on HSI Color Model by Sundarajoo, Suresh, Ahmad Shahrizan, Abdul Ghani

    Published 2018
    “…In this project HSI-based color enhancement algorithm were used for object identification. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems by Tara Othman Qadir, Tara Othman Qadir, N.S.A.M Taujuddin, N.S.A.M Taujuddin

    Published 2024
    “…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
    Get full text
    Get full text
    Article
  20. 20

    Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq

    Published 2024
    “…The unified RBF model is then used for autotuning the PID controller using the DE algorithm. The proposed RBF-NN system identification can successfully predict the attitude dynamics of a quadplane in all flight modes with a coefficient of determination of R2 greater than 0.9 and a computing mean time of less than 5 ms. …”
    Get full text
    Get full text
    Get full text
    Article