Search Results - (( based location process algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- process algorithm »
- location process »
- method algorithm »
- based location »
-
1
Modelling of optimal placement and sizing of battery energy storage system using hybrid whale optimization algorithm and artificial immune system for total system losses reduct...
Published 2023“…Besides, an optimization algorithm with high efficiency is important to ensure the attainment of optimal solutions, where the optimization algorithms like genetic algorithm and particle swarm optimization are known to have high possibility of being trapped in local optimal points. …”
text::Thesis -
2
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012“…A three phase fault location algorithm using database and impedance based method is utilized in distribution system to locate fault which may occur in any possible fault sections and to optimize the switching operations to reduce the outage time affected by fault. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem
Published 2008“…Based on the proposed heuristic method, we developed a program to optimize the routing problem using the Visual Studio C++ 6.0 programming language.…”
Get full text
Get full text
Monograph -
4
Firefly analytical hierarchy algorithm for optimal allocation and sizing of distributed generation in radial distribution network
Published 2022“…Finally, an AHP was integrated with FA to form Firefly Analytical Hierarchy Algorithm (FAHA) to automatically calculate the weight of each objective function based on the load flow outputs followed by the optimisation process. …”
Get full text
Get full text
Get full text
Thesis -
5
Optimizing the placement of fire department in Kulim using greedy heuristic and simplex method / Muhammad Abu Syah Mohd Suzaly
Published 2023“…The first method is greedy heuristic method. Greedy heuristics is a type of optimization algorithm that makes decisions based on locally optimal solutions. …”
Get full text
Get full text
Thesis -
6
An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir
Published 2016“…The second method is automatic optimization using Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
7
Impact of evolutionary algorithm on optimization of nonconventional machining process parameters
Published 2025“…Using a Python environment, three evolutionary algorithms such as, Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), and Firefly Algorithm (FA), were simulated to evaluate their effectiveness in minimizing surface roughness (Ra). …”
Get full text
Get full text
Get full text
Article -
8
Enhancing Solutions Of Capacity Vehicle Routing Problem Based On An Improvement Ant Colony System Algorithm
Published 2019“…The paper aims to discover an optimal route for VRP by using Improvement Ant Colony System Algorithm (IACS). …”
Get full text
Get full text
Get full text
Article -
9
Regionalization by fuzzy expert system based approach optimized by genetic algorithm.
Published 2013“…In recent years soft computing methods are being increasingly used to model complex hydrologic processes. …”
Get full text
Get full text
Article -
10
Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian
Published 2009“…This project investigate the performance of handoff process with the help of location information which is called Location-Sensitive Handoff (L-SH) using the location positioning method. …”
Get full text
Get full text
Research Reports -
11
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
Get full text
Get full text
Thesis -
12
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
13
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…The second layer employed spatial data and the fuzzy Technique for Order Preference by Similarity to Ideal Solution algorithm to refine potential solar energy sites, yielding the top 100 optimal locations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
15
Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid
Published 2013“…Contrary to conventional techniques which mainly rely on matrix operation, the proposed algorithm implements optimization technique as an alternative for performing the tracing process. …”
Get full text
Get full text
Thesis -
16
Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid
Published 2013“…Contrary to conventional techniques which mainly rely on matrix operation, the proposed algorithm implements optimization technique as an alternative for performing the tracing process. …”
Get full text
Get full text
Thesis -
17
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…The results from experiments show that handoff latency using the new algorithms is much lower than using AMTree handoff procedure in both cases, i.e. when the source connects to a subscribed base station or not subscribed base station. …”
Get full text
Get full text
Thesis -
18
Flood mapping based on novel ensemble modeling involving the deep learning, Harris Hawk optimization algorithm and stacking based machine learning
Published 2025“…The modeling process through the stated algorithms showed that the most important flood predictors are represented by: slope (importance � 20%), distance from river (importance � 17.5%), land use (importance � 12%) and TPI (importance � 10%). …”
Article -
19
Global Algorithms for Nonlinear Discrete Optimization and Discrete-Valued Optimal Control Problems
Published 2009“…These problems are known as discrete-valued optimal control problems. Most practical discrete-valued optimal control problems have multiple local minima and thus require global optimization methods to generate practically useful solutions. …”
Get full text
Get full text
Get full text
Thesis -
20
