Search Results - (( developing fraction case algorithm ) OR ( java validation using algorithm ))

Refine Results
  1. 1

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…The fatty acid precut fractionation column chosen as a case study is modeled by the commercial simulator, HYSYS.Plant. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Hazard identification on fractionation column using rule based expert system by Mohd Yunus, Mohd Yusri, Ali, Mohamad Wijayanuddin

    Published 2001
    “…The base case study used is a fractionation column of an oleochemical plant. …”
    Get full text
    Get full text
    Article
  3. 3

    Non-Parametric and Parametric Estimations of Cure Fraction Using Right-and Interval-Censored Data by Aljawdi, Bader

    Published 2011
    “…In this case, the estimation was developed based on the exponential and Weibull distributions using the right and interval censoring types; and 2) when covariates were incorporated into the analysis through the scaleparameter of the exponential distribution only using the same types of data censoring. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Solving fractional differential equations using fractional explicit method by Yip, Lian Yiung, Zanariah Abdul Majid

    Published 2024
    “…The main goal of this research is to derive FEM by considering the implementation of second-order Adam-Bashforth method using Lagrange interpolation for fractional case. Besides, the order and convergence analysis of the developed method will also be investigated in this study. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Solving fractional differential equations using fractional explicit method by Yiung, Yip Lian, Abdul Majid, Zanariah

    Published 2024
    “…The main goal of this research is to derive FEM by considering the implementation of second-order Adam-Bashforth method using Lagrange interpolation for fractional case. Besides, the order and convergence analysis of the developed method will also be investigated in this study. …”
    Get full text
    Get full text
    Article
  6. 6

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Development of rule-based advisory system from modified hazard and operability study on fatty acid fractionation column by M. Yunus, M. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…The base case in this study is a fatty acid fractionation column of an oleo chemical plant. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Parametric cure fraction models for interval-censoring with a change-point based on a covariate threshold by Ali Taweab, Fauzia

    Published 2015
    “…It becomes a very useful tool for handling situations in which a proportion of subjects under study may never experience the event of interest. Cure fraction models for interval-censored data are less developed compared to the right-censoring case. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Fault detection and diagnosis using correlation coefficients by Mak, Weng Yee

    Published 2005
    “…A fractionation column from a palm oil fractionation plant is chosen as the case study and the model of the case study is simulated in Matlab. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Artificial neural network and inverse solution method for assisted history matching of a reservoir model by Negash, B.M., Vel, A., Elraies, K.A.

    Published 2017
    “…This allows to directly simulate the trained neural network and avoid the use of objective function and optimization algorithm. The efficacy of the developed approach was evaluated using a benchmark reservoir model case study which was originally developed for investigation of three-phase three-dimensional Black-Oil modelling techniques under the 9th SPE comparative study project. …”
    Get full text
    Get full text
    Article
  18. 18

    A port-stream based equation oriented modelling of complex distillation column: A dividing wall column case study by Rosshila, Idris, Noorlisa, Harun, Mohamad Rizza, Othman

    Published 2020
    “…To verify the functionality of the proposed method, the modelled DWC is validated with two case studies depicted from experimental literature data to separate alcohol mixture and fatty acid fractionation. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  20. 20

    Region-growing based segmentation and bag of features classification for breast ultrasound images by Lee, Lay Khoon

    Published 2017
    “…To measure the result of algorithm developed, dice coefficient (DC) is the metric that is chosen to measure the accuracy of algorithm; Dice similarity coefficient (DSC) was used as a statistical validation metric to evaluate the performance of both the reproducibility of manual segmentations and the spatial overlap accuracy of automated probabilistic fractional segmentation of ultrasound images. …”
    Get full text
    Get full text
    Thesis