Search Results - (( data protection system algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- protection system »
- system algorithm »
- method algorithm »
-
1
Optimal overcurrent relay coordination in wind farm using genetic algorithm
Published 2015“…Many suggestions have been made and approaches implemented, however one of the most prominent methods is the use of Genetic Algorithm (GA) to improve the function and coordination of OCRs. …”
Get full text
Get full text
Thesis -
2
Differential Evolution Based Special Protection and Control Scheme for Contingency Monitoring of Transmission Line Overloading
Published 2017“…IEEE 30-bus test system was used to verify the effectiveness of the implemented methods.…”
Get full text
Get full text
Get full text
Book Section -
3
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…In future work, the algorithm can still be optimized to offer better performance. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…The emergence of Deep Learning (DL) models allow more training possibilities and improvement in performance. DL models often use gradient descent optimization, i.e., the Back-Propagation (BP) algorithm; therefore, their training and optimization procedures suffer from local sub-optimal solutions. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Furthermore, to evaluate the efficiency of the proposed modified differential evolution for the training of ridgelet probabilistic neural network, four statistical search techniques, namely, particle swarm optimization, genetic algorithm, simulated angling, and classical differential evolution are used and their results are compared. …”
Get full text
Get full text
Thesis -
7
Geographical information system (GIS) based planning technique for forest road network access : case study in Ayer Hitam Forest Reserve
Published 2016“…The current forest road was surveyed and tracked using Global Positioning System (GPS) device followed by data analysis in GIS software. …”
Get full text
Get full text
Project Paper Report -
8
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
9
Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid
Published 2012“…In this work however, the fault protection is an additional feature of the control system, where the wavelet based fault tolerant system has been tested and simulated using a 1kW IM, which has a short stator winding and sensor faults, while the primary faults are open stator winding. …”
Get full text
Get full text
Thesis -
10
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…To increase security, we perform secure authentication by creating an effective methodology based on the Touch Well before Use (TWU) method which protects against attacks. …”
Article -
11
Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran
Published 2015“…A new optimization approach was proposed for redesign monitoring network wells using optimization algorithm based on the vulnerability of aquifer to contaminations, estimation error of sampling wells, nearest distance between wells, and source of contamination in the study area. …”
Get full text
Get full text
Thesis -
12
Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali
Published 2016“…At any process of recognition stage, the biometric data is protected and also whenever there is a compromise to any information in the database it will be on the cancelable biometric template merely without affecting the original biometric information. …”
Get full text
Get full text
Thesis -
13
Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis
Published 2017“…Hybrid neural network was utilized as an evaluation method to select the optimal selection method and optimal training algorithm. …”
Get full text
Get full text
Thesis -
14
White blood cell recognition for biomarker model using improved convolutional neural network (CNN)
Published 2022“…However, with vast amount of WBCs data and various DL architectures available, tuning an optimal DL model is a daunting task. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
State-of-charge estimation for lithium-ion batteries with optimized self-supervised transformer deep learning model
Published 2023“…In the first stage, the model is pre-trained using unlabeled data with unsupervised learning. …”
text::Thesis -
16
Discovering decision algorithm from a distance relay event report
Published 2009“…Nowadays protection engineers are suffering from very complex implementations of protection system analysis due to massive quantities of data coming from diverse points of intelligent electronic devices. …”
Get full text
Get full text
Get full text
Article -
17
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…With the association rule in hand, a distance relay performance analysis Expert System called Protective Relay Analysis System (PRAY) had been designed. …”
Get full text
Get full text
Thesis -
18
Enhanced Storage Mechanism for Secured Parallel Network File System
Published 2018“…The prime focus is on file locking techniques, state maintenance of file locks and layouts, data compression and data protection across network attached storage and parallel network file system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis
