Search Results - (( developing continue ruling algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Comprehensive power restoration approach using rule-based method for 11kV distribution network by Khalid A.R., Ahmad S.M.S., Shakil A., Pa N.N., Shafie R.M.

    Published 2023
    “…This paper presents a restoration algorithm based on a Rule-Based approach. The algorithm is computationally programmed to provide multiple solutions and to recommend the best option of switching for a dispatcher. …”
    Conference Paper
  3. 3

    Mobile application for blood donation using geolocation and rule-based algorithm / Muhammad Firzan Azrai Nuzilan and Mohd Ali Mohd Isa by Nuzilan, Muhammad Firzan Azrai, Mohd Isa, Mohd Ali

    Published 2021
    “…Iterative Waterfall model that consisting of requirement analysis, design, system development, testing, and documentation helped the process of developing the application effectively because it consists of step by step process. …”
    Get full text
    Get full text
    Get full text
    Book Section
  4. 4
  5. 5

    A comprehensive power restoration approach using rule-based method for 11kV distribution network by Khalid, Abd Rahman, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Shakil, Asma, Nik Pa, Nawar, Mohd Shafie, Roslin

    Published 2008
    “…This paper presents a restoration algorithm based on a Rule-Based approach. The algorithm is computationally programmed to provide multiple solutions and to recommend the best option of switching for a dispatcher. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Multi-sources model and control algorithm of an energy management system by Hannan, MA, Azidin, FA, Mohamed, Azah

    Published 2012
    “…This paper presents the multi-sources energy models and ruled based feedback control algorithm of an energy management system (EMS) for light electric vehicle (LEV), i.e., scooters. …”
    Get full text
    Get full text
    Article
  8. 8

    Predicting autistic spectrum disorder for toddler using ant colony optimization / Nur Ibtisyam Zafri by Zafri, Nur Ibtisyam

    Published 2021
    “…The Ant-Miner algorithm was then used in this analysis to establish classification rules for the prediction of autistic spectrum disorder. …”
    Get full text
    Get full text
    Student Project
  9. 9

    SYSTEMATIC DESIGN OF SIMPLY STRUCTURED COMPENSATOR by FUNG , CHUN TING

    Published 2005
    “…In this project, the algorithm of the tuning method based on Nyquist Stability Criterion is developed first. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11
  12. 12

    Formulation of model predictive control algorithm for nonlinear processes by Mohd. Yusof, Khairiyah, Hassim, Mimi Haryani, Tan, Sook Li, Ab. Rashid, Siti Rafidah

    Published 2004
    “…An unconstrained MIMO DMC and nonlinear MPC (NNMPC) algorithms were developed using a step response model and two feedforward neural networks respectively. …”
    Get full text
    Get full text
    Monograph
  13. 13
  14. 14

    Rule-base wearable embedded platform for seizure detection from real EEG data in ambulatory state by Shakir, M., Malik, A.S., Kamel, N., Qidwai, U.

    Published 2014
    “…This fact has been exploited in this paper and filter has been developed to isolate the seizure band. The rule base has been developed on the calculated measures for the filtered signal from this band-filter and classification is performed on the basis of certain empirical thresholds. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Rule-Base Wearable Embedded Platform for Seizure Detection from Real EEG Data in Ambulatory State by Mohamed, Shakir, Malik, Aamir Saeed, Kamel , Nidal, Qidwai, Uvais

    Published 2014
    “…This fact has been exploited in this paper and filter has been developed to isolate the seizure band. The rule base has been developed on the calculated measures for the filtered signal from this band-filter and classification is performed on the basis of certain empirical thresholds. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm by Slamet, ., Izzeldin, I. Mohd, Fahmi, Samsuri

    Published 2020
    “…Detection techniques against attacks on computer networks must be continuously developed so that integrity, availability and confidentiality on a computer network become more secure. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19
  20. 20

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…The algorithm development combines the frameworks from Phases 1 to 3, evaluating real and synthetic datasets. …”
    Get full text
    Get full text
    Get full text
    Thesis