Search Results - (( a distribution impact algorithm ) OR ( _ detection system algorithm ))

Refine Results
  1. 1

    Adaptive load balancing algorithm for wireless distributed computing networks by Alfaqawi, Mohammed, Habaebi, Mohamed Hadi, Siddiqi, Mohammad Umar, Islam, Md. Rafiqul, Khan, Sheroz, Datla, Dinesh

    Published 2016
    “…Furthermore, the channel impact on the distributed tasks by ALB algorithm, in WDC-CRN, is investigated and benchmarked. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    An analysis of the effect of heterogeneously distributed inertia constant in generation mix power system by using the graph theory and Dijkstra’s Algorithm by Harshada Nerkar, Kundu, Prasanta, Chowdhury, Anandita

    Published 2023
    “…This paper incorporates the concept of graph theory in the IEEE 30 bus system to analyze the impact of heterogenous inertia distribution on frequency stability. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Al-Jumaily A.

    Published 2025
    “…Additionally, tests demonstrate that combining canopy and the K-means algorithm to analyze data performs consistently and dependably on the Hadoop platform and has a clustering result that offers a scalable and effective solution for power system monitoring. ? …”
    Article
  4. 4
  5. 5

    PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm by Muhamad Zahim, Sujod, Siti Nor Azlina, Mohd Ghazali, Mohd Fadzil, Abdul Kadir, Al-Shetwi, Ali Qasem

    Published 2024
    “…In light of the escalating global concerns regarding energy security and the irregular distribution of daily irradiance affecting photovoltaic (PV) system output, the demand for effective fault detection and diagnosis techniques in PV management systems is on the rise. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Supervised deep learning algorithms for process fault detection and diagnosis under different temporal subsequence length of process data by Terence Chia Yi Kai, Agus Saptoro, Zulfan Adi Putra, King Hann Lim, Wan Sieng Yeo, Jaka Sunarso

    Published 2025
    “…Different lengths of snippets of sequence (or subsequence) would have a multitude of perspectives viewed by the deep learning algorithms, subsequently impacting their FDD performance. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Omega grey wolf optimizer (ωGWO) for optimization of overcurrent relays coordination with distributed generation by Noor Zaihan, Jamal

    Published 2019
    “…The overall protection coordination is thus very complicated and could not be satisfied using the conventional method moreover for the modern distribution system. This thesis apply a meta-heuristic algorithm called Grey Wolf Optimizer (GWO) to minimize the overcurrent relays operating time while fulfilling the inequality constraints. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Smart Microgrid approach for Distributed power generation of renewable energy by Khushi, Farha, Motakabber, S. M. A., Ahmed Hamida, Belal, Azman, Amelia Wong, Bhattacharjee, Amit

    Published 2021
    “…This research modelled a smart grid system combined with a faulty detection mechanism for an efficient mechanism to overcome uncertainties. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9
  10. 10

    Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules by Wiliani, Ninuk

    Published 2023
    “…Error-prone areas may be difficult to locate or recognise in a big solar photovoltaic module. A solar photovoltaic modules system can hide it until the whole system collapse or breakdown. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks by Wang Jie, Mohd. Kamal Mohd. Shah, Choong Wai Heng, Nahiyan Al-Azad

    Published 2024
    “…The aging infrastructure of petroleum and natural gas pipelines poses a threat to national economies, necessitating precise defect detection for safety and efficiency. To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Distributed Denial-of-Service Defense System by Hanasi, Lidiyawatie

    Published 2006
    “…Distributed denial-of-service (DoS) attacks present a great threat to the Internet, and existing security mechanisms cannot detect or stop them successfully. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Optimal resource allocation for NOMA wireless networks by Albogamy, Fahad R., Aiyashi, M. A., Hashim, Fazirul Hisyam, Imran Khan, Choi, Bong Jun

    Published 2022
    “…Different power allocation techniques will have a direct impact on the system’s throughput. As a result, in order to boost the system capacity, an efficient power allocation mechanism must be investigated. …”
    Get full text
    Get full text
    Article
  14. 14

    Fast-varying flicker mitigation using D-statcom and its identification / Nur Fadhilah Jamaludin by Jamaludin, Nur Fadhilah

    Published 2015
    “…The negative impact of power quality problem due to voltage flicker has gained a growing concern from utilities, especially in the areas of distribution planning. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An enhanced android botnet detection approach using feature refinement by Anwar, Shahid

    Published 2019
    “…As a result, Android botnet can be used to initiate various distributed coordinated attacks including spam emails, click frauds, bitcoins mining, distributed denial of service attacks disseminating other malware and much more. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Application of slantlet transform based support vector machine for power quality detection and classification by Mohd Noh, Faridah Hanim, Miyauchi, Hajime, Yaakub, M. Faizal

    Published 2015
    “…To ensure the power supply is at the highest quality, an automatic system for detection and localization of PQ activities in power system network is required. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Application Of Slantlet Transform Based Support Vector Machine For Power Quality Detection And Classification by M. Noh, Faridah Hanim, Hajime, Miyauchi, Yaakub, Muhamad Faizal

    Published 2015
    “…To ensure the power supply is at the highest quality, an automatic system for detection and localization of PQ activities in power system network is required. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A Symbol Recognition System for Single-Line Diagrams Developed Using a Deep-Learning Approach by Bhanbhro, H., Kwang Hooi, Y., Kusakunniran, W., Amur, Z.H.

    Published 2023
    “…Based on deep-learning techniques, a dataset can be used to assess the overall quality of a visual system. …”
    Get full text
    Get full text
    Article
  19. 19

    Design and development of iRemote Terminal Unit (iRTU) for undervoltage and overvoltage fault by Wan Nor Shela Ezwane, Wan Jusoh

    Published 2014
    “…The purpose of this research is to design an iRTU hardware circuit board, develop the iRTU using software algorithms, create the interfacing for monitoring process and integrate software and hardware together to make the iRTU as a complete system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Sequential pattern mining using personalized minimum support threshold with minimum items by Alias, Suraya, Razali, Mohd Norhisham, Tan, Soo Fun, Sainin, Mohd Shamrie

    Published 2011
    “…One of the challenges of Sequential Pattern Mining is finding frequent sequential patterns in a huge click stream data (web logs) since the data has the issue of a very low support distribution.By applying a Frequent Pattern Discovery technique, a sequence is considered as frequent if it occurs more than the minimum support (min sup) threshold value.The conventional method of assuming one min sup value is valid for all levels of k-sequence, may have an impact on the overall results or pattern generation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item