Search Results - (( data protection system algorithm ) OR ( using optimization method algorithm ))

Refine Results
  1. 1

    Optimal overcurrent relay coordination in wind farm using genetic algorithm by Razaei, Nima

    Published 2015
    “…Many suggestions have been made and approaches implemented, however one of the most prominent methods is the use of Genetic Algorithm (GA) to improve the function and coordination of OCRs. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection by Shing, Chiang Tan, Mohammed Al-Andoli, Mohammed Nasser, Kok, Swee Lim, Pey, Yun Goh, Chee, Peng Lim

    Published 2023
    “…The emergence of Deep Learning (DL) models allow more training possibilities and improvement in performance. DL models often use gradient descent optimization, i.e., the Back-Propagation (BP) algorithm; therefore, their training and optimization procedures suffer from local sub-optimal solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Furthermore, to evaluate the efficiency of the proposed modified differential evolution for the training of ridgelet probabilistic neural network, four statistical search techniques, namely, particle swarm optimization, genetic algorithm, simulated angling, and classical differential evolution are used and their results are compared. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Geographical information system (GIS) based planning technique for forest road network access : case study in Ayer Hitam Forest Reserve by Danney, Arnold

    Published 2016
    “…The current forest road was surveyed and tracked using Global Positioning System (GPS) device followed by data analysis in GIS software. …”
    Get full text
    Get full text
    Project Paper Report
  8. 8

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid by Gaeid, Khalaf Salloum

    Published 2012
    “…In this work however, the fault protection is an additional feature of the control system, where the wavelet based fault tolerant system has been tested and simulated using a 1kW IM, which has a short stator winding and sensor faults, while the primary faults are open stator winding. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks by Atiewi S., Al-Rahayfeh A., Almiani M., Abuhussein A., Yussof S.

    Published 2025
    “…To increase security, we perform secure authentication by creating an effective methodology based on the Touch Well before Use (TWU) method which protects against attacks. …”
    Article
  11. 11

    Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran by Narany, Tahoora Sheikhy

    Published 2015
    “…A new optimization approach was proposed for redesign monitoring network wells using optimization algorithm based on the vulnerability of aquifer to contaminations, estimation error of sampling wells, nearest distance between wells, and source of contamination in the study area. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali by M. Ali, Musab A.

    Published 2016
    “…At any process of recognition stage, the biometric data is protected and also whenever there is a compromise to any information in the database it will be on the cancelable biometric template merely without affecting the original biometric information. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis by Abujayyab, Sohaib K. M.

    Published 2017
    “…Hybrid neural network was utilized as an evaluation method to select the optimal selection method and optimal training algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    White blood cell recognition for biomarker model using improved convolutional neural network (CNN) by Mohd Safuan, Syadia Nabilah

    Published 2022
    “…However, with vast amount of WBCs data and various DL architectures available, tuning an optimal DL model is a daunting task. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    State-of-charge estimation for lithium-ion batteries with optimized self-supervised transformer deep learning model by Dickson Neoh Tze How, Dr.

    Published 2023
    “…In the first stage, the model is pre-trained using unlabeled data with unsupervised learning. …”
    text::Thesis
  16. 16

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…Nowadays protection engineers are suffering from very complex implementations of protection system analysis due to massive quantities of data coming from diverse points of intelligent electronic devices. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…With the association rule in hand, a distance relay performance analysis Expert System called Protective Relay Analysis System (PRAY) had been designed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Enhanced Storage Mechanism for Secured Parallel Network File System by K J, Latesh Kumar

    Published 2018
    “…The prime focus is on file locking techniques, state maintenance of file locks and layouts, data compression and data protection across network attached storage and parallel network file system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Application of genetic algorithm methods to optimize flowshop sequencing problem by Mohd Fadil, Md Sairi

    Published 2008
    “…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
    Get full text
    Get full text
    Thesis