Search Results - (( network implementation force algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- network implementation »
- implementation force »
- application mining »
- java application »
- mining algorithm »
- force algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
Get full text
Get full text
Get full text
Thesis -
5
An intelligent method to estimate the inertia matrix of a robot arm for active force control using on-line neural network training scheme
Published 1999“…This paper presents a new intelligent controller algorithm comprising an on-line multi-layer artificial neural network (ANN) training scheme to estimate the inertia matrix of the robot arm to enhance the performance of the active force control (AFC) scheme. …”
Get full text
Get full text
Get full text
Article -
6
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
A new fair marker algorithm for DiffServ networks
Published 2008“…The paper design and implement the algorithm with extensive simulations using NS-2 simulator to compare the proposed algorithm with previous algorithms. …”
Get full text
Get full text
Article -
10
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
11
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Practical implementation of skyhook and adaptive active force control to an automotive suspension system
Published 2008“…The paper focuses on the practical implementation of a new robust control method to an automotive active suspension system using skyhook and adaptive active force control (SANAFC) strategy. …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The proposed method was validated by comparing the output force of PSCA with the experimental target force from load cell (reference). …”
Get full text
Get full text
Thesis -
16
Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed
Published 2000“…GA is then implemented using the Genetic Algorithm Toolbox (GAOT). …”
Get full text
Get full text
Thesis -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
18
Potential field methods and their inherent approaches for path planning
Published 2016Get full text
Get full text
Article -
19
DSP-based flexible digital hysteresis in switched capacitor active power filter
Published 2010“…By integrating hysteresis current control with digital-based neural network harmonic detection, the proposed SCAPF forces the supply current to be sinusoidal, to have low current harmonics, and to be in phase with the line voltage. …”
Get full text
Article -
20
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…Furthermore, some analyses on hiding quality show that our algorithm retains the cover image quality as high as that of standard LSB algorithm. …”
Get full text
Get full text
Get full text
Thesis
