Search Results - (( developing formal control algorithm ) OR ( java data visualization algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  4. 4

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
    Get full text
    Get full text
    Monograph
  5. 5

    A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers by Alwi @ Suhaimi, Saifulza, Salleh, Mohd Rizal, Jaafar, Hazriq Izzuan, Ab Ghani, Mohd Ruddin, Md Fauadi, Muhammad Hafidz Fazli

    Published 2019
    “…Therefore, it is essential to determine control system safety in advance by verifying the possibility of state transitions from safe to unsafe states at the design and development stage. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  6. 6

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Real time monitoring and controlling using Petri net algorithm for batch process plant / Mohamad Shaiful Osman by Osman, Mohamad Shaiful

    Published 2010
    “…This thesis searches the basic concepts and uses of the classical method Petri net algorithm in SCADA system to control and monitoring the process plant. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  10. 10

    Design of Auto-stabilization Control Technique for a Quadrotor System by Abas, Norafizah, Ab. Rashid , Mohd Zamzuri, Ibrahim, Zulkifilie, Samsudin, Nur hazahsha

    Published 2013
    “…Therefore, the main focus of this research is to design an appropriate control algorithm that able to auto-stabilize the quadrotor at hover. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Design of auto-stabilization control technique for a quadrotor system by Abas, Norafizah, Akmeliawati, Rini, Ibrahim, Zulkiflie, Rashid, M. Zamzuri A., Samsudin, N. Hazahsha

    Published 2013
    “…Therefore, the main focus of this research is to design an appropriate control algorithm that able to auto-stabilize the quadrotor at hover. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…As with all software development, good design and engineering practices are important for software quality. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Performance analysis of predictive functional control for automobile adaptive cruise control system by Zainuddin, Mohamed Al-Sideque, Abdullah, Muhammad, Ahmad, Salmiah, Uzair, Mohd Suhaimi, Ahmad Baidowi, Zaid Mujaiyid Putra

    Published 2023
    “…Thus, the prime objective of this work is to propose a PFCalgorithm as an alternative controller, while providing a formal comparisonbetweenMPCand the traditional Proportional Integral (PI) controller. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Algebraic study of fuzzy finite switchboard automata by Ebas, Nur Ain

    Published 2020
    “…Thus, it is necessary to understand the modeling of switching and commutative mechanisms as a controller in a machine. Fuzzy set theory can be applied to solve the control problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A novel design of an isochronous integration [iIntegration] framework for first/second order multidisciplinary transient systems by Shimada, Masao, Masuri, Siti Ujila, Tamma, Kumar K.

    Published 2015
    “…Focusing on the class of the linear multistep (LMS) methods, algorithms by design was first utilized to develop GS4-2 framework for time integration of second order systems. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…As a result, developing an efficient controller-agnostic network intrusion-detection method is imperative. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad by Iftikhar , Ahmad

    Published 2019
    “…The system model of the proposed solution is also developed and evaluated at macro level through formal verification. …”
    Get full text
    Get full text
    Get full text
    Thesis