Search Results - (( data protection method algorithm ) OR ( using optimization based algorithm ))

Refine Results
  1. 1
  2. 2

    Optimal overcurrent relay coordination in wind farm using genetic algorithm by Razaei, Nima

    Published 2015
    “…GA was used to obtain improved values for each relay settings based on their coordination criteria. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Differential Evolution Based Special Protection and Control Scheme for Contingency Monitoring of Transmission Line Overloading by Othman, Mohammad Lutfi, Hadi, Mahmood Khalid, Abdul Wahab, Noor Izzri

    Published 2017
    “…In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution (DE) algorithm for optimal generation rescheduling to mitigate line overloads in contingency conditions has been presented. …”
    Get full text
    Get full text
    Get full text
    Book Section
  4. 4

    Machine learning in botda fibre sensor for distributed temperature measurement by Nur Dalilla binti Nordin

    Published 2023
    “…Therefore, this thesis explores the comparative analysis for BOTDA data processing using the six most suited machine learning algorithms. …”
    text::Thesis
  5. 5

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm by Abd Rahman, Mohd Shahrizan, Jamaludin, Nor Azliana Akmal, Zainol, Zuraini, Tengku Sembok, Tengku Mohd

    Published 2025
    “…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Hybrid optimisation electromagnetic interference shielding effectiveness:mechanical and physical performance of plaster mortar containing palm oil fuel ash using taguchi grey and t... by Oh Lai Ching, Narong

    Published 2019
    “…Six factors namely POFA admixture percentage, topcoat powder /binder ratio (TP/B), water/binder ratio (W/B), latex agent content (LA), the particle size of POFA and curing condition are used to control the nine responses. Pre-experiment data is optimized based on Taguchi-grey and Flower Pollination Algorithm (FPA) methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Based on the results the proposed method is accurate in detecting islanding phenomena and effective in noisy conditions.…”
    Get full text
    Get full text
    Thesis
  10. 10

    SVM, ANN, and PSF modelling approaches for prediction of iron dust minimum ignition temperature (MIT) based on the synergistic effect of dispersion pressure and concentration by Arshad, U., Taqvi, S.A.A., Buang, A., Awad, A.

    Published 2021
    “…Data-driven models for predicting fire and explosion-related properties have been improved greatly in recent years using machine-learning algorithms. However, choosing the best machine learning approach is still a challenging task. …”
    Get full text
    Get full text
    Article
  11. 11

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Robust estimation methods for fixed effect panel data model having block-concentrated outliers by Abu Bakar @ Harun, Nor Mazlina

    Published 2019
    “…The Ordinary Least Squares (OLS) is the commonly used method to estimate the parameters of fixed effect panel data model. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA by Ahmed, Shakil

    Published 2013
    “…This standard uses AESXTS as a building block for the protection of data. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid by Gaeid, Khalaf Salloum

    Published 2012
    “…In this work however, the fault protection is an additional feature of the control system, where the wavelet based fault tolerant system has been tested and simulated using a 1kW IM, which has a short stator winding and sensor faults, while the primary faults are open stator winding. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Geographical information system (GIS) based planning technique for forest road network access : case study in Ayer Hitam Forest Reserve by Danney, Arnold

    Published 2016
    “…The current forest road was surveyed and tracked using Global Positioning System (GPS) device followed by data analysis in GIS software. For this study, Network Analysis method was used by using Cost Back Link Tool in GIS. …”
    Get full text
    Get full text
    Project Paper Report
  16. 16

    Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran by Narany, Tahoora Sheikhy

    Published 2015
    “…A new optimization approach was proposed for redesign monitoring network wells using optimization algorithm based on the vulnerability of aquifer to contaminations, estimation error of sampling wells, nearest distance between wells, and source of contamination in the study area. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis by Abujayyab, Sohaib K. M.

    Published 2017
    “…Hybrid neural network was utilized as an evaluation method to select the optimal selection method and optimal training algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks by Atiewi S., Al-Rahayfeh A., Almiani M., Abuhussein A., Yussof S.

    Published 2025
    “…To increase security, we perform secure authentication by creating an effective methodology based on the Touch Well before Use (TWU) method which protects against attacks. …”
    Article
  19. 19

    White blood cell recognition for biomarker model using improved convolutional neural network (CNN) by Mohd Safuan, Syadia Nabilah

    Published 2022
    “…However, with vast amount of WBCs data and various DL architectures available, tuning an optimal DL model is a daunting task. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    State-of-charge estimation for lithium-ion batteries with optimized self-supervised transformer deep learning model by Dickson Neoh Tze How, Dr.

    Published 2023
    “…In the first stage, the model is pre-trained using unlabeled data with unsupervised learning. …”
    text::Thesis