Search Results - (( java extraction method algorithm ) OR ( program implementation force algorithm ))
Search alternatives:
- program implementation »
- implementation force »
- extraction method »
- method algorithm »
- java extraction »
- force algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
2
Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed
Published 2000“…The conventional filter design technique is adapted in writing a MATLAB program using the Signal Processing Toolbox. GA is then implemented using the Genetic Algorithm Toolbox (GAOT). …”
Get full text
Get full text
Thesis -
3
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Modular motor driver with torque control for gripping mechanism
Published 2023“…This is possible by taking in the magnitude of the current drawn by the load as the feedback to the system and set appropriate action to protect the system from damage when a certain setpoint of current is reached. In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
5
Mapreduce algorithm for weather dataset
Published 2017“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Thesis -
6
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
7
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
8
Two-axis position-based impedance control of a 2-DOF robotic finger / Khairunnisa Nasir
Published 2017“…The positionbased impedance control algorithm was designed by regulating the mechanical impedance of the robotic finger based on force measurements from the two embedded force sensors. …”
Get full text
Get full text
Thesis -
9
-
10
MapReduce algorithm for weather dataset
Published 2018“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Research Report -
11
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…Recent research has focused on analysing Android Intent in the XML file. We propose a new method of analysing Android Intent in Java code, which includes implicit intent and explicit intent. …”
Get full text
Get full text
Get full text
Thesis -
12
Numerical simulation of hybrid composite tubes under oblique compression
Published 2017“…A proper contact algorithm is implemented to prevent interpenetration among elements and surfaces. …”
Get full text
Get full text
Get full text
Article -
13
Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin
Published 2012“…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
Get full text
Get full text
Thesis -
14
-
15
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The data collected for this machine learning model is using the statistically significant features from vibration and acoustic analysis. The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. …”
Get full text
Get full text
Monograph -
16
Adaptive constitutive analytical model code for rubber bearings with load-dependent variable analytical model in seismically isolated steel structures
Published 2026“…Thereafter, a dedicated computational algorithm and macro program were developed and implemented within a finite-element software environment to enable real-time adjustment of the lateral stiffness and damping properties of rubber bearings at each time step based on instantaneous vertical reaction forces. …”
Get full text
Get full text
Get full text
Article -
17
Development of finite element model for soil-structure interaction
Published 2014“…Then, the special finite element algorithm and computer program (2DSSI) is developed to perform two-dimensional nonlinear SSI analysis by considering interfacial behavior of soil and frame elements. …”
Get full text
Get full text
Thesis -
18
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
19
-
20
Optimal SVC allocation via symbiotic organisms search for voltage security improvement
Published 2023“…In this paper, Symbiotic Organisms Search (SOS) algorithm is implemented to solve for optimal allocation of SVC in the power system. …”
Article
