Search Results - (( java application mining algorithm ) OR ( changes evaluation force algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Effects of control techniques and damper constraint on the performance of a semi-active magnetorheological damper by K. , Hudha, Jamaluddin, H., Samin, P. M., Rahman, R. A.

    Published 2005
    “…Semi-active dampers change their damping force in real time by simply changing the damping coefficient according to a control policy. …”
    Get full text
    Get full text
    Article
  8. 8

    Regenerative braking strategy for electric vehicles using improved adaptive genetic algorithm by Taleghani, Hussein

    Published 2017
    “…One uses Standard Genetic Algorithm (SGA), the second strategy uses Improved Adaptive Genetic Algorithm (IAGA). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Comparison between Lamarckian Evolution and Baldwin Evolution of neural network by Taha, Imad, Inazy, Qabas

    Published 2006
    “…Hybrid genetic algorithms are the combination of learning algorithms(Back propagation), usually working as evaluation functions, and genetic algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Refinement of Tuned Mass Damper parameters on machine support structure using dynamic Cuckoo Search algorithm by Ahmad Muinuddin, Mahmood, Zamri, Mohamed, Rosmazi, Rosli

    Published 2025
    “…In the dynamic CS algorithm, the value for discovery probability (pa) and the step size factor (a) are changed dynamically which changes the convergence speed to the solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Form Finding And Shape Change Analysis Of Spine Inspired Bio-Tensegrity Model by Oh, Chai Lian

    Published 2017
    “…In the third phase, the structural characteristics of SBS models such as the deformed configurations and changes of axial force at the end of shape change analysis are investigated. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Application of inerter in passenger vehicle suspension systems / Soong Ming Foong by Soong, Ming Foong

    Published 2015
    “…Also, the practicality of a parallel inerter implementation was studied by investigating the feasibility of an inerter incorporating damping. Then, switching algorithms were implemented to the inerter to evaluate potential further ride performance improvement brought by these modifications. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Development of control algorithm for a new 12s-6p single phase field excited flux switching motor by Amin, Faisal

    Published 2020
    “…Bipolar DC signal algorithm is based on changing the polarity of armature DC voltage on the detection of zero rotor position. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Computational modeling of running biomechanics in amateur runners by Teh, Yew Wei

    Published 2024
    “…Analysis revealed significant changes in muscle force generation at 80 km, indicating the body's adaptation to accumulated running distance. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…Later, this MOCSSA is applied on service restoration to ensure the proposed algorithm technique is suitable in selecting the optimal switches for supply recovery after the line section is isolated from the system either by forced outage or planned outage purposes. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of finite element model for soil-structure interaction by Shoaei, Mohammad Dalili

    Published 2014
    “…All the redistributions and alterations of structural forces contributed in changing the yielding mechanisms of the considered frames. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Edge tracing of t-shirt by robot for spreading purposes by Sahari K.S.M., Seki H.

    Published 2023
    “…Vision sensor is used from time to time to check whether the tracing gripper has reached a corner or not. Based on the algorithm used for towel spreading, algorithm for edge tracing of shirt to find a second or third corner is proposed. …”
    Conference paper
  19. 19

    Tubular Linear Switched Reluctance Actuator: Design And Characterization by Yeo,, Chin Kiat

    Published 2019
    “…Next, the force and motion characteristics of the tubular LSRA are evaluated to verify the actuator design and the behaviour of the tubular LSRA is obtained through the open loop experiment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Securing graphical user password using multi-grid technique from shoulder surfing attack / Leila Ghasemi Sabet by Sabet, Leila Ghasemi

    Published 2010
    “…For security in graphical password, there are some attacks such as shoulder surfing, and brute force. Shoulder surfing is one of the major attacks; it means this project must cover the shoulder surfing attacks for making the algorithms more secure. …”
    Get full text
    Get full text
    Thesis