Search Results - (( developing failure control algorithm ) OR ( java visualization using algorithm ))

Refine Results
  1. 1

    A performance analysis of association rule mining algorithms by Fageeri, S.O., Ahmad, R., Alhussian, H.

    Published 2016
    “…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Performance analysis of Software Defined Network (SDN) in link failure scenario by R.Badlishah, Ahmad, Sakari, M.A.I.M, Yaakob, N, Amir, A, Warip, M.N.M., Ibrahim, Z.

    Published 2019
    “…As SDN decouples data and control planes, routing algorithm is determined by its controller. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Performance analysis of Software Defined Network (SDN) in link failure scenario by Badlishah, Ahmad, Sakari, M.A.I.M, Yaakob, N, Amir, A, Mohd Warip, M.N, Ibrahim, Z.

    Published 2019
    “…As SDN decouples data and control planes, routing algorithm is determined by its controller. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Algorithms are developed for a simulated mobile robot that uses an array of range finders for navigation. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A centralised multi-objective model predictive control for biventricular assist devices / Vivian Koh Ci Ai by Vivian Koh , Ci Ai

    Published 2020
    “…Heart failure is defined as failure of heart to deliver adequate blood flow rate to support tissue perfusion. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Intelligent PID Controller Tuned by Bacterial Foraging Optimization Algorithm for Vibration Suppression of Horizontal Flexible Structure by Aizat Ikmal, Abd Raof, Muhamad Sukri, Hadi, Intan Zaurah, Mat Darus, Annisa, Jamali, Mat Hussin, Ab Talib, Hanim, Mohd Yatim

    Published 2022
    “…BFO is a metaheuristic approach categorized as an evolutionary algorithm recently developed, and a nature-inspired optimization algorithm. …”
    Get full text
    Get full text
    Proceeding
  12. 12

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  13. 13

    Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis by Mohamed Elfaki, Faiz Ahmed

    Published 2004
    “…The work in this thesis is concerned with the development of techniques for the assessment of statistical process control in data that include censored observations. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers by Alwi @ Suhaimi, Saifulza, Salleh, Mohd Rizal, Jaafar, Hazriq Izzuan, Ab Ghani, Mohd Ruddin, Md Fauadi, Muhammad Hafidz Fazli

    Published 2019
    “…Any failure of these process control systems might not only result in a significant financial loss but also lead to casualties as well. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  15. 15

    Diesel Engine Control And In-Cylinder Peak Pressure Monitoring System Using Raspberry PI by Yeo, Ying Heng

    Published 2019
    “…A simple closed loop algorithm is developed to control the start of injection timing (SOI) of a single cylinder diesel engine using the ECU. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Ant colony optimization for controller and sensor-actuator location in active vibration control by Md Nor, Khairul Affendy, Abdul Muthalif, Asan Gani, Wahid, Azni N.

    Published 2013
    “…The main focus is to find the optimal location of the collocated sensor-actuatorand controller gains using a swarm intelligent algorithm called Ant Colony Optimization (ACO) which later verified with Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Article
  17. 17

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  18. 18

    Modelling and analysis of sensor fault tolerant control using behavioral approach to systems theory by Ng, Peng Hong

    Published 2015
    “…Mathematical models of the plants are first derived through the description of the manifest behavior by elimination of the latent variables via a systematic algorithm. Next, the algorithms for obtaining controllers using pole placement techniques are developed based on specified nominal control laws to retain all the desirable trajectories in the plant behavior while rejecting the undesirable ones. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20