Search Results - (( developing failure detection algorithm ) OR ( java application using algorithm ))
Search alternatives:
- developing failure »
- failure detection »
- java application »
- using algorithm »
-
1
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Finally, the verification on the two additional sites of FD algorithm has detected the 'No Fault' and 'Fault' as suggested by the type of failure occurrence and failure identification technique.…”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS
Published 2014Get full text
Get full text
Final Year Project -
4
DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS
Published 2014Get full text
Get full text
Final Year Project -
5
-
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
Vibration analysis for early detection of bearing failures
Published 2024“…Early detection of bearing failures using Predictive Maintenance (PdM) is critical for minimizing downtime and optimizing maintenance strategies. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
9
Radiometric partial discharge location detection in medium voltage switchgears
Published 2023“…This paper focuses on the development of methods/algorithm to accurately locate and detect these PD signals within the 3D space of a medium voltage (MV) switch gear. …”
Conference paper -
10
Epileptic Seizure Detection Using Singular Values And Classical Features Of EEG Signals
Published 2014“…This project aims at developing an automated epileptic seizure event detection algorithm. …”
Get full text
Get full text
Final Year Project -
11
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
12
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
13
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…This advantage is useful in systematically detect failures in process plant. Therefore, an algorithm for the development of process fault detection system in dynamic processes using artificial neural network (ANN) is presented. …”
Get full text
Get full text
Conference or Workshop Item -
14
Development of a detection and classification method for induction motor faults using Motor Current Signature Analysis and Feedforward Neural Network / Felicity Bulan Leo Uchat
Published 2016“…In this thesis, the detection and classification of induction motor faults due to electrical related failures using Motor Current Signature Analysis (MCSA) and Feedforward Neural Network (FNN) neural network is proposed. …”
Get full text
Get full text
Thesis -
15
Pairwise Test Suite Generation Based on Hybrid Artificial Bee Colony Algorithm
Published 2020“…Pairwise testing is one of the efficient CTT that used widely for fault detection based on the caused failures by two interactions parameters. …”
Get full text
Get full text
Article -
16
Prediction of progressive failure in woven glass/epoxy composite laminated panels.
Published 2008“…Tsai-Hill failure theory has been employed in the progressive failure methodology to detect failure of the woven composite laminates. …”
Get full text
Get full text
Article -
17
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…Many clustered routing algorithms have been developed to address various issues like energy efficiency, network lifetime, and hotspot problems. …”
Article -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
