Search Results - (( variable deviation detection algorithm ) OR ( java information optimization algorithm ))

Refine Results
  1. 1

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Development of a rule-based fault diagnostic advisory system for precut fractionation column by Heng, Han Yann

    Published 2005
    “…Although the scheme was developed based on data of fatty acid precut fractionation column, the algorithm of fault detection and diagnosis can be extended to other chemical process by changing the x-MR chart and HAZOP for each selected monitoring variables.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fault diagnostic advisory system using moving-range chart and hazard operability study. by Heng, Han Yann, Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2007
    “…Fault is considered to occur if one variable is out of control limit. The advisory system has successfully detected and diagnosed the deviations and displayed the causes and consequences of the faults. …”
    Get full text
    Get full text
    Article
  6. 6

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  7. 7

    Fault diagnostic advisory system using moving-range chart and hazard operability study by Heng, Han Yann, Ali, Mohamed Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2007
    “…Fault is considered to occur if one variable is out of control limit. The advisory system has successfully detected and diagnosed the deviations and displayed the causes and consequences of the faults. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. …”
    Get full text
    Get full text
    Article
  9. 9

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest by Ghulam Hussain, Muhammad Thaqif, Shafeeq Lone, Aman, Maspo, Nur-Adib, Attarbashi, Zainab

    Published 2026
    “…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter by Nooralishahi, Parham, Loo, Chu Kiong, Shiung, Liew Wei

    Published 2019
    “…We propose a novel algorithm to estimate heart rate. Also, it can differentiate between a photo of a human face and an actual human face meaning that it can detect false signals and skip them. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Characterization of digital intra-oral dental radiographs based on image enhancement algorithms (IEAs) / Siti Arpah Ahmad by Ahmad, Siti Arpah

    Published 2017
    “…Thus, this work investigates the role of sharpening and AHE based image enhancement in reducing variability among the evaluation. New rule using existing standard deviation (std = 0) is utilized to determine the dentists' decision on the image quality and detected abnormalities. …”
    Get full text
    Get full text
    Thesis
  15. 15

    HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC by Jamil, Nur Farahim

    Published 2014
    “…The algorithm gives a mean accuracy of 84% out of 125 test images.…”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Development Of Two New Auxiliary Information Control Charts, And Economic And Economic-Statistical Designs Of Several Auxiliary Information Control Charts by Ng Peh, Sang

    Published 2020
    “…Results show that the RS X - AI chart generally surpasses the existing X - AI, synthetic X - AI and EWMA X - AI charts in the detection of outof- control signals. The second objective of this thesis is to develop the variable sampling interval exponentially weighted moving average t AI (VSI EWMA t - AI) chart for monitoring the process mean when errors in estimating the process standard deviation exist. …”
    Get full text
    Get full text
    Thesis
  17. 17

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. SecPath is evaluated with several variations using 400 nodes in WSN deployments as well as large-scale simulations. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman by Osman, Noor Diyana

    Published 2014
    “…The last part is the development of a metal artifact correction (MAC) algorithm and evaluation of the proposed algorithm in artifacts reduction in CT images. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Enhancing CI engine performance and emission control using a hybrid RSM–Rao algorithm for ZnO-doped castor–neem biodiesel blends by Zhu, Chao-zhe, Samuel, Olusegun D., Patel G C, Manjunath, Der, Oguzhan, Abbas, Mohamed, Hussain, Fayaz, Ting, Tin Tin

    Published 2025
    “…RSM was used to plan the design of the experiment and detect the optimal engine conditions for enhancing PI and reducing EAs while 3 algorithms were used to solve a multi-objective function. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis