Search Results - (( _ application using algorithm ) OR ( variable operations using algorithm ))
Search alternatives:
- variable operations »
- operations using »
- using algorithm »
-
1
Fault diagnostic algorithm for precut fractionation column
Published 2004“…This paper presents an algorithm which can be used to detect and diagnose unexpected process faults in the operation of fatty acid precut fractionation column. …”
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Study on numerical solution of a variable order fractional differential equation based on symmetric algorithm
Published 2019“…A fully symmetric classification of the boundary value problem for a class of fractional differential equations with variable sequences is determined by using a fully symmetric differential sequence sorting algorithm. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Using Particle Swarm Optimization Algorithm in the Distribution System Planning
Published 2013“…Since the optimal operation of distribution networks is an optimization problem with discrete and continuous variables, it can be introduced as an integer problem that can be formulated using the metaheuristic approach. …”
Get full text
Get full text
Get full text
Article -
6
A MODIFIED PARTICLE SWARM OPTIMIZATION ALGORITHM FOR WELLBORE TRAJECTORY DESIGN
Published 2021“…The improvements of the original PSO algorithm are proposed by updating its exploitation phase by incorporating the GWO algorithm because of its strong exploitation capability and the exploration phase using a cellular automaton due to its ability to explore more area by constructing new neighbours. …”
Get full text
Get full text
Thesis -
7
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
A Comparative Analysis of Peak Load Shaving Strategies for Isolated Microgrid Using Actual Data
Published 2022“…The model consists of four major components such as, PV, BESS, variable load, and gas turbine generator (GTG) dispatch models for the proposed algorithm, where the BESS and PV models are not applicable for the capacity addition technique. …”
Get full text
Get full text
Article -
9
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…We refer to the new DE algorithm as random variable length crossover DE (rvlx- DE) algorithm. …”
Get full text
Get full text
Thesis -
10
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…The algorithm also supports two modes of operation namely EBC and CBC. …”
Get full text
Get full text
Article -
12
A review of crossover methods and problem representation of genetic algorithm in recent engineering applications
Published 2020“…The algorithm operates on three simple genetic operators called selection, crossover and mutation. …”
Get full text
Get full text
Get full text
Article -
13
Evaluation of outlier filtering algorithms for accurate measurement of travel time reliability incorporating lane-splitting situations / Obada M. A. Asqool
Published 2022“…Thus, the Jang algorithm and TransGuide algorithm could be used after calibrating their parameters for each day. …”
Get full text
Get full text
Get full text
Thesis -
14
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Modeling and validation of base pressure for aerodynamic vehicles based on machine learning models
Published 2023“…The data for training and testing the algorithms was derived using the regression equation developed using the Box-Behnken Design (BBD). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
Get full text
Get full text
Monograph -
17
Development of a rule-based fault diagnostic advisory system for precut fractionation column
Published 2005“…The developed algorithm is expected to enhance the safety of operation in oleochemical industry. …”
Get full text
Get full text
Thesis -
18
Application of Hybrid Evolutionary Algorithm and thematic map for rule set generation and visualization of chlorophyta abundance at Putrajaya lake / Lau Chia Fong
Published 2013“…HEA is run on the training set in order to provide insights on the relationships between input variables and the algae abundance. Performances of the rule sets are assessed using Receiving Operating Characteristic (ROC) with true positive rate. …”
Get full text
Get full text
Thesis -
19
To study the multi-objective optimization of EDM using genetic algorithm
Published 2013“…In the process of the study, the second- order mathematical model has been create as a fitness function using MATLAB software to generate multi-objective optimization responses using Genetic Algorithms, peak current, pulse-on time, pulse-off time and servo voltage are act as input of parameter setting. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm
Published 2008“…In the future development, the proposed system can be used as the discrete controller when it implemented in the process control application.…”
Get full text
Get full text
Thesis
