Search Results - (( variable detection system algorithm ) OR ( java application clustering algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…This work is interested in proposing an observer with fuzzy variable gains for a general nonlinear system. Furthermore, a linear model has been built to facilitate the accomplishment of the fault detection of the industrial servo system by using the proposed observer. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A real time road marking detection system on large variability road images database by Khan, Bahadur Shah, Hanafi, Marsyita, Mashohor, Syamsiah

    Published 2017
    “…One of the first embedded system is a lane detection system, which was implemented using road marking detection algorithms with the aim to produce a system that is able to detect various shapes of road markings on the images that are captured under various imaging conditions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  10. 10

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…One of the embedded systems that received great attention is road detection system, that operates using road markings detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Image Based Congestion Detection Algorithms And Its Real Time Implementation by Khdiar, Ahmed Nidhal

    Published 2015
    “…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…However, multiple access interference (MAI) is a major constraint limiting the capacity of the system. Multiuser detection and smart antenna technologies are capable of increasing the system capacity through mitigation of such impairment. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Pure intelligent monitoring system for steam economizer trips by Basim Ismail F., Hamzah Abed K., Singh D., Shakir Nasif M.

    Published 2023
    “…Economizers; Failure (mechanical); Fault detection; Knowledge acquisition; Learning algorithms; Learning systems; Neural networks; Plant shutdowns; Steam; Thermoelectric power plants; Extreme learning machine; Fault detection and diagnosis systems; Intelligent modeling; Intelligent monitoring systems; Network methodologies; Operational conditions; Operational variables; Thermal power plants; Steam power plants…”
    Conference Paper
  18. 18

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19
  20. 20

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis