Search Results - (( set implementation force algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Intelligent active force control of a robotic arm using genetic algorithm by Mailah, Musa, Wong, Min Yee, Jamaluddin, Hishamuddin

    Published 2002
    “…In this paper, genetic algorithm (GA) is used to estimate suitable value of IN of a robotic manipulator necessary for the implementation of the AFC strategy through a simulation study. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of airbag suit system for motorcyclist by Zainal Abidin, Zulkifli, Razali, Fakhruddin

    Published 2014
    “…The calibration involved a sizable collection of samples, analysis and training to set the threshold in the algorithm which decides the emergency events. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhanced gravitational search algorithm for nano-process parameter optimization problem / Norlina Mohd Sabri by Mohd Sabri, Norlina

    Published 2020
    “…The second enhancement is the implementation of the distance ratio parameter to select only the nearest agents for the accumulation of forces among the Kbest agents. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Development of straight line robot movement by Ching, Wai Hoong

    Published 2012
    “…PIC is selected as the brain board controller due to react and respond to the data received from Digital Compass Module to identify and figure out desired position. The implementation of internal PID algorithm is essentially used to restore the system to desired set-point position. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Discretization of crack propagation on parallel computing: complexity and parallel algorithms with source code by Alias, Norma, Islam, Md. Rajibul

    Published 2010
    “…The element stiffness matrix which had been set up earlier can be used to describe the elastic deformation since the numerical FEM is emphasized as a platform for discretization of one-dimensional continua problems where the stress is uniaxial and implemented on parallel algorithm using the distributed parallel computer system. …”
    Get full text
    Get full text
    Get full text
    Book
  15. 15

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
    Conference paper
  16. 16

    Discretization of crack propagation on parallel computing : complexity and parallel algorithms with source code by Alias, Norma, Islam, Md. Rajibul

    Published 2010
    “…The element stiffness matrix which had been set up earlier can be used to describe the elastic deformation since the numerical FEM is emphasized as a platform for discretization of one-dimensional continua problems where the stress is uniaxial and implemented on parallel algorithm using the distributed parallel computer system. …”
    Get full text
    Get full text
    Get full text
    Book Section
  17. 17

    Development of Straight Line Robot Movement Using Digital Compas Module by Wan Ismail, Ibrahim, Mohd Riduwan, Ghazali, Mohd Zaidi, Mohd Tumari

    Published 2012
    “…PIC is selected as the brain board controller due to react and respond to the data received from Digital Compass Module to identify and figure out desired position. The implementation of internal PID algorithm is essentially used to restore the system to desired set-point position. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Intelligent material handling mobile robot for industrial purpose with active force control capability by Mailah, Musa, Jamaluddin, Hishamuddin, Pitowarno, Endra, Purnomo, Didik Setyo

    Published 2005
    “…The effectiveness and robustness of the proposed schemes were investigated through a rigorous simulation study and later complemented with experimental results obtained through a number of experiments performed on a fully developed working prototype in a laboratory setting. A number of disturbances in the form of vibratory and impact forces are deliberately introduced into the system to evaluate the system performances. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…Furthermore, some analyses on hiding quality show that our algorithm retains the cover image quality as high as that of standard LSB algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique by Abulifa, Abdulhadi Abdulsalam

    Published 2022
    “…The work in this thesis is expected to be the best approach in formulating an adaptive fuzzy technique based on brute force and regression algorithms for optimization and prediction of EMS in BEV application.…”
    Get full text
    Get full text
    Thesis