Search Results - (( developing block prevention algorithm ) OR ( java code classification algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Accident Prevention Block to Move an Automobile From Traffic Collision by Rajiv, Charles Samuel

    Published 2019
    “…In the present work, an attempt has been made to propose an accident prevention block in automobiles that can sense the tired/sleepy driver via a camera and algorithms, to maneuver the vehicle to safety. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  4. 4

    Monitoring the Quality of Ozone towards the Prevention of Further Global Warming by Abas, M. Amir, Azim, M.Khusairy, Fadzil, M.Helmi, M.Dahlui, UniKL BMI

    Published 2013
    “…The data logger uses 16-Bit Microcontroller as the main control board housing data logger algorithm, Solar Tracker algorithm and data storage block. …”
  5. 5

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…Intrusion Prevention System (IPS) provides an in-line mechanism focus on identifying and blocking malicious network activity in real time. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of novel distance relay scheme to prevent false tripping during power swing by Mohamad, Nor Zulaily

    Published 2017
    “…Moreover, a new adaptive distance protection algorithm is also developed to block the false tripping operation during power swing and unblock the operation if a fault occurs during power swing. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of novel distance relay scheme to prevent false tripping during power swing / Nor Zulaily Mohamad by Mohamad, Nor Zulaily

    Published 2017
    “…Moreover, a new adaptive distance protection algorithm is also developed to block the false tripping operation during power swing and unblock the operation if a fault occurs during power swing.…”
    Get full text
    Get full text
    Book Section
  9. 9

    Improvement of power swing blocking scheme in distance protection relay by Ya'u, Mohammed Sani

    Published 2015
    “…Due to the characteristics of distance relay that can trip during power swings, a Power Swing Blocking (PSB) unit is developed to prevent unwanted distance relay operation during power swings. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Depth frame loss concealment for wireless transmission utilising motion detection information by Ranjbari, Mohamadreza

    Published 2014
    “…The second method also facilitates the frame copy algorithm in the depth sequence, however, the high motion blocks inside the frame that intended to be copied are found and then they will be interpolated; furthermore, the low motion blocks remain unchanged in the frame. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Energy Management System For Controlling Series Hybrid Electric Motorcycle by Cham , Chin Long

    Published 2016
    “…Tuning and adaptation of the control algorithm had been demonstrated so developers can make use of them for their applications. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Spear- phishing attack detection using artificial intelligence by Rajkumaradevan, Sanglidevan

    Published 2024
    “…The goal is to mitigate phishing and spam threats by using advanced algorithms to detect malicious URLs and classify messages effectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Energy Management System For Controlling Series Hybrid Electric Motorcycle by Cham , Chin Long

    Published 2016
    “…Tuning and adaptation of the control algorithm had been demonstrated so developers can make use of them for their applications. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Prediction of rice biomass using machine learning algorithms by Radhwane, Derraz

    Published 2022
    “…A split-plot randomised complete block design (RCBD) experiment was conducted in a rice granary at Terengganu, Malaysia, with 120 quadrants. …”
    Get full text
    Get full text
    Thesis