Search Results - (( process deviation selection algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Development of a rule-based fault diagnostic advisory system for precut fractionation column by Heng, Han Yann

    Published 2005
    “…The system detected and diagnosed process deviations using the saved data and the set limit. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Fault diagnostic advisory system using moving-range chart and hazard operability study. by Heng, Han Yann, Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2007
    “…Moving-Range (x-MR) Chart and (HAZOP) study were used to define the causes and consequences of process deviation based on selected parameter for each study node. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Fault diagnostic advisory system using moving-range chart and hazard operability study by Heng, Han Yann, Ali, Mohamed Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2007
    “…Moving-Range (x-MR) Chart and HAZOP study were used to define the causes and consequences of process deviation based on selected parameter for each study node. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Neural Network Model and Finite Element Simulation of Spring back in Plane-Strain Metallic Beam Bending by Abu Khadra, Fayiz Y. M.

    Published 2006
    “…To validate the finite element model physical experiments were conducted. A neural network algorithm based on the backpropagation algorithm has been developed. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…In order to improve classification performance problem, feature selection and discretization algorithm are crucial in selecting relevant attributes that could improve classification performance. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…The threshold adaptation was achieved by using the mean value, the standard deviation, and the L1-norm instead of the comparison of user summaries evaluation method to obtain a fully automatic video summarisation algorithm, and by eliminating the conditions in selecting the final key frames to reduce the complexity of the algorithm. …”
    Get full text
    Get full text
    Article
  10. 10

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12

    Model input and structure selection in multivariable dynamic modeling of batch distillation column pilot plant / Ilham Rustam by Rustam, Ilham

    Published 2015
    “…This is made apparent when the resultant model was found not being able to generalize a process that deviates from its training parameters.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Metacarpal phantom radiograph edge detection using genetic algorithm gradient based genotype / Norharyati Md Ariff by Md Ariff, Norharyati

    Published 2007
    “…For the image segmentation, genetic algorithm are use to segment the bone image and it is a new method that applies in the image processing field. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Modeling of flood water level prediction using NNARX / Fazlina Ahmat Ruslan by Ahmat Ruslan, Fazlina

    Published 2015
    “…This is made apparent when the resultant model was found not being able to generalize a process that deviates from its training parameters.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Optimal distribution system reconfiguration incorporating distributed generation based on simplified network approach / Mohammad Al Samman by Mohammad , Al Samman

    Published 2020
    “…In addition, this work considered non-dispatchable renewable energy resources and load variations for daily operation. The selected meta-heuristic techniques in this research involve the Firefly Algorithm (FA) and Biogeography-Based Optimization (BBO). …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Reactive approach for automating exploration and exploitation in ant colony optimization by Allwawi, Rafid Sagban Abbood

    Published 2016
    “…The third component is the ACO-based adaptive parameter selection algorithm to solve the parameterization problem which relies on quality, exploration and unified criteria in assigning rewards to promising parameters. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  20. 20

    A genetic algorithm to minimise the maximum lateness on a single machine family scheduling problem by Lee, Lai Soon, Nazif, Habibeh

    Published 2009
    “…Setup includes obtaining tool, positioning work in process, cleanup, etc. In most scheduling research work, the setup time has been considered as either negligible and hence ignored, or considered as part of the processing time. …”
    Get full text
    Conference or Workshop Item