Search Results - (( using mapping force algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- force algorithm »
- using mapping »
- mapping force »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Labview Based Pid Algorithm Development for Z Motion Control in Atomic Force Microscopy
Published 2015“…It provide a high resolution of 3 dimensional imaging. Thus, it is commonly used in mapping, measuring and scaling in nano sizes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
Enhancing benthic habitat mapping: A review of integrating satellite and side scan sonar data for improved classification accuracy
Published 2024“…The contribution of slope derived from bathymetry varies with extraction algorithms; the use of more sophisticated algorithms leads to higher accuracy. …”
Get full text
Get full text
Article -
10
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
Software User Interface and Algorithm Development for Signal and Noise Characterization
Published 2015“…The data from photodiode is read by LabVIEW software for further develop to obtain useful output data. The previous task done by senior is I/V converter and algorithm for detect location of photodiode are implement by using LM741 op-amp chip on printed circuit board. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…However, Lamarckian learning does alleviate the problem of multiple genotypes mapping to the same phenotype. Baldwinian learning uses learning algorithm to change the fitness landscape, but the solution that is found is not encoded back into genetic string. …”
Get full text
Get full text
Get full text
Article -
14
Cryptanalysis and design of chaos based image encryption schemes
Published 2025“…To address these challenges, we propose secure image encryption schemes that are based on enhanced chaotic maps. Specifically, we enhance the chaotic behavior of one-dimensional and two-dimensional chaotic maps using cascading techniques. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
A simulation and experimental study on wheeled mobile robot path control in road roundabout environment
Published 2019“…The road’s roundabout is represented in a grid map and the path of the mobile robot is determined using a novel approach, the so-called laser simulator technique within the roundabout environment according to the respective road rules. …”
Get full text
Get full text
Get full text
Article -
16
Intelligent motion planning of a mobile robot by using convolutional neural network / Siti Asmah Abdullah
Published 2019“…Planning the path of the mobile robot by using Convolutional Neural Network (CNN) is important in optimizing the cost in terms of energy, time and human intervention force. …”
Get full text
Get full text
Get full text
Thesis -
17
Modular motor driver with torque control for gripping mechanism
Published 2023“…Using the same hardware configuration, the different algorithms produced different outcomes on the output of the controller. …”
Conference paper -
18
On the use of fuzzy rule interpolation techniques for monotonic multi-input fuzzy rule base models
Published 2009“…This can be accomplished with the use of a search algorithm, such as the brute force, genetic algorithm or etc…”
Get full text
Get full text
Get full text
Article -
19
Computational methods for self-assembly of DNA nanostructures / Ong Hui San
Published 2016“…Several approaches have been adopted including development of an autonomous tool that incorporated evolutionary optimization algorithm in constructing these heterogeneous DNA shapes and the application of heuristic through undirected graph theory as an annotation schema to produce the connectivity maps. …”
Get full text
Get full text
Thesis -
20
Multi-array sensorised pillowcase as call detection alarm system for in ward tetraplegic patient / Normazlianita Mohamad Alias
Published 2021“…A case study was performed on an able-bodied person and two tetraplegic patients who used the sensor as the pillow cover. Findings from this case study have demonstrated the ability to map the force on the surface of the pillow and subsequently the location of the force applied with 71% accuracy and 70% sensitivity. …”
Get full text
Get full text
Get full text
Thesis
