Search Results - (( process deviation detection algorithm ) OR ( java application learning algorithm ))

Refine Results
  1. 1

    Sensing texture using an artificial finger and a data analysis based on the standard deviation by Chappell, Paul H., Muridan, Norasmahan, Mohamad Hanif, N. H. H, Cranny, Andy, White, Neil M.

    Published 2015
    “…The standard deviation analysis for texture detection is novel as it uses a combination of arthmetic processes. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…This paper presents an algorithm which can be used to detect and diagnose unexpected process faults in the operation of fatty acid precut fractionation column. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Development of a rule-based fault diagnostic advisory system for precut fractionation column by Heng, Han Yann

    Published 2005
    “…The system detected and diagnosed process deviations using the saved data and the set limit. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…This paper presents a unified approach to process fault detection and diagnosis (FDD) intelligent program for pre-cut fatty acid fractionation column. …”
    Get full text
    Get full text
    Article
  7. 7

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Fault diagnostic advisory system using moving-range chart and hazard operability study. by Heng, Han Yann, Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2007
    “…Although the scheme was developed based on precut fractionation column, the algorithm of fault detection and diagnosis can be extended to other chemical process by changing the x-MR chart and HAZOP study for each selected monitoring variables.…”
    Get full text
    Get full text
    Article
  11. 11

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  12. 12
  13. 13

    Fault diagnostic advisory system using moving-range chart and hazard operability study by Heng, Han Yann, Ali, Mohamed Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2007
    “…Although the scheme was developed based on precut fractionation column, the algorithm of fault detection and diagnosis can be extended to other chemical process by changing the x-MR chart and HAZOP study for each selected monitoring variables…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Experiment and analysis of computer vision-based wrist radial and ulnar deviation exercises by M. Zabri, Abu Bakar, Rosdiyana, Samad, Pebrianti, Dwi, Mahfuzah, Mustafa, Nor Rul Hasma, Abdullah

    Published 2017
    “…The researchers have kept on improving the existing methods by creating novel method or developing new algorithms in image processing and artificial intelligence. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Metacarpal phantom radiograph edge detection using genetic algorithm gradient based genotype / Norharyati Md Ariff by Md Ariff, Norharyati

    Published 2007
    “…For the image segmentation, genetic algorithm are use to segment the bone image and it is a new method that applies in the image processing field. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Collaboration algorithms between intermediaries for supporting flexible supply chain management by Mohd Tamrin, Mohd Izzuddin, Tengku Sembok, Tengku Mohd, Kartiwi, Mira

    Published 2013
    “…The collaboration algorithms are design to go through five main phases in order to continuously monitor and detect any deviations from the processes currently running at the vacinity of the members. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Sleep apnea detection using cardioid based grap by Mohd Azam, Siti Nurfarah Ain, Sidek, Khairul Azami, Zainal, Nur Izzati

    Published 2016
    “…Unique features were extracted using the Pan Tompkins algorithm, later Cardioid based graph was formed as the result of the differentiation process. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis