Search Results - (( _ application using algorithm ) OR ( variable operations using algorithm ))

Refine Results
  1. 1

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…This paper presents an algorithm which can be used to detect and diagnose unexpected process faults in the operation of fatty acid precut fractionation column. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Study on numerical solution of a variable order fractional differential equation based on symmetric algorithm by Liu, Jingrui, Pan, Dongyang

    Published 2019
    “…A fully symmetric classification of the boundary value problem for a class of fractional differential equations with variable sequences is determined by using a fully symmetric differential sequence sorting algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Using Particle Swarm Optimization Algorithm in the Distribution System Planning by Shamshiri, Meysam, Gan, Chin Kim, Mariana, Yusoff, Ab Ghani, Mohd Ruddin

    Published 2013
    “…Since the optimal operation of distribution networks is an optimization problem with discrete and continuous variables, it can be introduced as an integer problem that can be formulated using the metaheuristic approach. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A MODIFIED PARTICLE SWARM OPTIMIZATION ALGORITHM FOR WELLBORE TRAJECTORY DESIGN by BISWAS, KALLOL

    Published 2021
    “…The improvements of the original PSO algorithm are proposed by updating its exploitation phase by incorporating the GWO algorithm because of its strong exploitation capability and the exploration phase using a cellular automaton due to its ability to explore more area by constructing new neighbours. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    A Comparative Analysis of Peak Load Shaving Strategies for Isolated Microgrid Using Actual Data by Rana, M.M., Rahman, A., Uddin, M., Sarkar, M.R., Shezan, S.A., Ishraque, M.F., Rafin, S.M.S.H., Atef, M.

    Published 2022
    “…The model consists of four major components such as, PV, BESS, variable load, and gas turbine generator (GTG) dispatch models for the proposed algorithm, where the BESS and PV models are not applicable for the capacity addition technique. …”
    Get full text
    Get full text
    Article
  9. 9

    Optimized differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan

    Published 2013
    “…We refer to the new DE algorithm as random variable length crossover DE (rvlx- DE) algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Enhanced chaotic image encryption algorithm based on Baker's map by Salleh, Mazleena, Ibrahim, Subariah, lsnin, Fauz

    Published 2003
    “…The algorithm also supports two modes of operation namely EBC and CBC. …”
    Get full text
    Get full text
    Article
  12. 12

    A review of crossover methods and problem representation of genetic algorithm in recent engineering applications by Zainuddin, Farah Ayiesya, Abd Samad, Md Fahmi

    Published 2020
    “…The algorithm operates on three simple genetic operators called selection, crossover and mutation. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Modeling and validation of base pressure for aerodynamic vehicles based on machine learning models by Quadros, Jaimon Dennis, Khan, Sher Afghan, Aabid, Abdul, Baig, Muneer

    Published 2023
    “…The data for training and testing the algorithms was derived using the regression equation developed using the Box-Behnken Design (BBD). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC) by Ibrahim, Kamarul 'Asri, Ahmad, Arshad, Ali, Mohamad Wijayanuddin, Mak, Weng Yee

    Published 2006
    “…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Development of a rule-based fault diagnostic advisory system for precut fractionation column by Heng, Han Yann

    Published 2005
    “…The developed algorithm is expected to enhance the safety of operation in oleochemical industry. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Application of Hybrid Evolutionary Algorithm and thematic map for rule set generation and visualization of chlorophyta abundance at Putrajaya lake / Lau Chia Fong by Lau, Chia Fong

    Published 2013
    “…HEA is run on the training set in order to provide insights on the relationships between input variables and the algae abundance. Performances of the rule sets are assessed using Receiving Operating Characteristic (ROC) with true positive rate. …”
    Get full text
    Get full text
    Thesis
  19. 19

    To study the multi-objective optimization of EDM using genetic algorithm by Fairuz, Idris

    Published 2013
    “…In the process of the study, the second- order mathematical model has been create as a fitness function using MATLAB software to generate multi-objective optimization responses using Genetic Algorithms, peak current, pulse-on time, pulse-off time and servo voltage are act as input of parameter setting. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm by Chong, Kok Hen

    Published 2008
    “…In the future development, the proposed system can be used as the discrete controller when it implemented in the process control application.…”
    Get full text
    Get full text
    Thesis