Search Results - (( set implementation force algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- implementation force »
- set implementation »
- application mining »
- java application »
- mining algorithm »
- force algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Intelligent active force control of a robotic arm using genetic algorithm
Published 2002“…In this paper, genetic algorithm (GA) is used to estimate suitable value of IN of a robotic manipulator necessary for the implementation of the AFC strategy through a simulation study. …”
Get full text
Get full text
Get full text
Article -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
Get full text
Get full text
Thesis -
9
Development of airbag suit system for motorcyclist
Published 2014“…The calibration involved a sizable collection of samples, analysis and training to set the threshold in the algorithm which decides the emergency events. …”
Get full text
Get full text
Get full text
Article -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
Enhanced gravitational search algorithm for nano-process parameter optimization problem / Norlina Mohd Sabri
Published 2020“…The second enhancement is the implementation of the distance ratio parameter to select only the nearest agents for the accumulation of forces among the Kbest agents. …”
Get full text
Get full text
Thesis -
12
-
13
Development of straight line robot movement
Published 2012“…PIC is selected as the brain board controller due to react and respond to the data received from Digital Compass Module to identify and figure out desired position. The implementation of internal PID algorithm is essentially used to restore the system to desired set-point position. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Discretization of crack propagation on parallel computing: complexity and parallel algorithms with source code
Published 2010“…The element stiffness matrix which had been set up earlier can be used to describe the elastic deformation since the numerical FEM is emphasized as a platform for discretization of one-dimensional continua problems where the stress is uniaxial and implemented on parallel algorithm using the distributed parallel computer system. …”
Get full text
Get full text
Get full text
Book -
15
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
16
Discretization of crack propagation on parallel computing : complexity and parallel algorithms with source code
Published 2010“…The element stiffness matrix which had been set up earlier can be used to describe the elastic deformation since the numerical FEM is emphasized as a platform for discretization of one-dimensional continua problems where the stress is uniaxial and implemented on parallel algorithm using the distributed parallel computer system. …”
Get full text
Get full text
Get full text
Book Section -
17
Development of Straight Line Robot Movement Using Digital Compas Module
Published 2012“…PIC is selected as the brain board controller due to react and respond to the data received from Digital Compass Module to identify and figure out desired position. The implementation of internal PID algorithm is essentially used to restore the system to desired set-point position. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Intelligent material handling mobile robot for industrial purpose with active force control capability
Published 2005“…The effectiveness and robustness of the proposed schemes were investigated through a rigorous simulation study and later complemented with experimental results obtained through a number of experiments performed on a fully developed working prototype in a laboratory setting. A number of disturbances in the form of vibratory and impact forces are deliberately introduced into the system to evaluate the system performances. …”
Get full text
Get full text
Monograph -
19
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…Furthermore, some analyses on hiding quality show that our algorithm retains the cover image quality as high as that of standard LSB algorithm. …”
Get full text
Get full text
Get full text
Thesis -
20
Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique
Published 2022“…The work in this thesis is expected to be the best approach in formulating an adaptive fuzzy technique based on brute force and regression algorithms for optimization and prediction of EMS in BEV application.…”
Get full text
Get full text
Thesis
