Search Results - (( development damage control algorithm ) OR ( java data visualization algorithm ))

Refine Results
  1. 1

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  4. 4

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…Torque control algorithm in a gripping actuator will allow sufficient force to be exerted to the object grasped without damaging the object. …”
    Conference paper
  6. 6

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Evaluation Algorithm - Based on PID Controller Design for the Unstable Systems by Wan Ismail, Ibrahim, Erliza, Serri, Mohd Riduwan, Ghazali

    Published 2015
    “…Evaluation algorithm develops to tune the PID controller for a better performance. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Intelligent Evolutionary Controller for Flexible Robotic Arm by Annisa, Jamali, Intan Z., Mat Darus

    Published 2020
    “…These problems may eventually cause damage to the highly stressed structures. This research focused on the development of the intelligent evolutionary controller algorithms for controlling flexible robotic arm manipulator. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of elasto-plastic viscous damper finite element model for reinforced concrete frames by Hejazi, Farzad, Zabihi, Alireza, Jaafar, Mohd Saleh

    Published 2014
    “…The experience of recent severe earthquakes indicates that sometimes the earthquake energy dissipation devices are damaged during earthquakes and there is no function for structural control system. …”
    Get full text
    Get full text
    Article
  11. 11

    Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system by Balla, Asaad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Mubarak, Sinil

    Published 2022
    “…In this paper, we have examined and presented the most recent research on developing robust IDSs using Deep Learning (DL) algorithms, including Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), Stacked Autoencoders (SAE), and Deep Belief Networks (DBN). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  13. 13

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  14. 14

    Design and implementation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayawi by Hayawi, Mustafa Jabbar

    Published 2015
    “…These effects, if not controlled, would lead to large scale oscillations that would damage system components. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Design of a swimming small soft robot for underwater applications by Chin, Chavez Zhee Ming

    Published 2024
    “…This directional control, along with linear swimming, was incorporated into a swimming algorithm controlled by three push buttons. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    Modelling of flexible beam based on ant colony optimization and cuckoo search algorithms by Ali, Siti Khadijah, Fadzilan, Mohamad Faisal, Shaari, Aida Nur Syafiqah, Hadi, Muhamad Sukri, Ting, Rickey Pek Eek, Mat Darus, Intan Zaurah

    Published 2021
    “…Therefore, two type of algorithms was used in this work for modelling development of flexible beam structure, which are ant colony optimization (ACO) and cuckoo search algorithm (CSA). …”
    Get full text
    Get full text
    Article
  19. 19

    Tuning of Distillation Column Control by Abu Hanipah, Muhammad Fathi

    Published 2015
    “…Once the designing of the controller is done, an algorithm is developed to make sure that the tuning of distillation column control can be done efficiently. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Intelligent Tuning of PID Controller for Double-Link Flexible Robotic Arm Manipulator by Artificial Bee Colony Algorithm by Jamali, Annisa, Mat Darus, I.Z., Yatim, H.M, A. Talib, M. H., Hadi, M.S, Tokhi, M.O.

    Published 2020
    “…These problems may eventually cause damage to the highly stressed structure. This research focuses on the development of intelligent controller utilizing artificial bee colony (ABC) algorithm to tune proportional integral derivative (PID) parameters for controlling two-link flexible manipulator (TLFRM). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter