Search Results - (( model implication ((from algorithm) OR (tree algorithm)) ) OR ( _ protection based algorithm ))

Refine Results
  1. 1

    Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar by Ja'afar, Nur Shahirah

    Published 2021
    “…These algorithms were developed by using prewar shophouses dataset from 2004 until 2018 based on factors of heritage properties. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud by Shariff, S. Sarifah Radiah, Hud, Hady

    Published 2023
    “…The assumptions adopted in the Decision Tree Model and K-Nearest Neighbour are derived from symbolic artificial intelligence and data mining, whilst the assumptions in the Artificial Neural Network are derived from the connectionist approach. …”
    Get full text
    Get full text
    Book Section
  4. 4

    Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary by Mohd Zamary, Nurul Aida

    Published 2024
    “…This project aims to develop a decision-making support model for diabetes diagnosis and treatment recommendation using the decision tree algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti by Abd Mokti, Nurnazifah

    Published 2024
    “…This research project focuses on developing a laptop price prediction model using the decision tree algorithm based on laptop specifications. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection by Bouke, Mohamed Aly, Alramli, Omar Imhemed, Abdullah, Azizol

    Published 2024
    “…Traditional machine learning algorithms such as Logistic Regression (LR), K-Nearest Neighbors (KNN), Decision Trees (DT), and Support Vector Machines (SVM) have been employed to mitigate this challenge. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology by Muhammad Hassif Imran, Muhammad Harris Irwan, Johari, Abdullah, Adnan Shahid, Khan, Nayeem Ahmad, Khan

    Published 2025
    “…The findings demonstrate that blockchain technology can play a crucial role in protecting cultural heritage, offering a replicable model for other traditional crafts facing similar challenges. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    The predictive machine learning model of a hydrated inverse vulcanized copolymer for effective mercury sequestration from wastewater by Ghumman, A.S.M., Shamsuddin, R., Abbasi, A., Ahmad, M., Yoshida, Y., Sami, A., Almohamadi, H.

    Published 2024
    “…NMDG functionalized IVP removed 100 Hg2+ from a low feed concentration (10â��50 mg/l). A predictive machine learning model was also developed to predict the amount of mercury removed () using GPR, ANN, Decision Tree, and SVM algorithms. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    A novel MPPT algorithm for load protection based on output sensing control by Hassani, M., Mekhilef, Saad, Patrick Hu, A., Watson, N.R.

    Published 2011
    “…This paper presents a novel maximum power point tracking (MPPT) algorithm for load protection based on output sensing control. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…A distance protective relay performance analysis is only feasible when the hypothesis of expected relay operation characteristics as decision rules is established as the knowledge base. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Genetic algorithm-based optimization of overcurrent relay Coordination for improved protection of DFIG operated wind farms by Rezaei, Nima, Uddin, Mohammad Nasir, Amin, Ifte Khairul, Othman, Mohammad Lutfi

    Published 2019
    “…Therefore, this article proposes a novel genetic algorithm (GA)-based optimization technique for proper coordination of the OCRs in order to provide improved protection of the wind farms. …”
    Get full text
    Get full text
    Article
  15. 15

    Genetic algorithm based optimization of overcurrent relay coordination for improved protection of DFIG operated wind farms by Rezaei, Nima, Uddin, Mohammad Nasir, Amin, Ifte Khairul, Othman, Mohammad Lutfi, Marsadek, Marayati

    Published 2018
    “…Therefore, this research proposes a novel genetic algorithm (GA) based optimization for proper coordination of OCRs to improve their functions for protection of wind farms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm by Hadi, Mahmaad Khalid

    Published 2016
    “…The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Othman, Mohammad Ridzal, Osman, Harussaleh

    Published 2011
    “…This paper investigates the implementation of a novel data mining approach of integrated-Rough-Set-and-Genetic-Algorithm based rule discovery and Rule Quality Measure to hypothesize expected relay behavior in the form of an association rule from digital protective relay’s resident event report. …”
    Get full text
    Get full text
    Article
  18. 18

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys by Khalaf, Emad Taha, Mohammed, Muamer N., Kohbalan, Moorthy, Hasan, Raed Abdulkareem

    Published 2018
    “…In this paper we proposed an efficient encryption method based on two invertible and random keys to enhance and overcome the weakness of hill cipher algorithm the keys generated using upper triangular matrices with Pseudo-Random Number Generator (PRNG) using two large and random encryption keys. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…This derived algorithm, aptly known as relay CD-prediction rules, can later be used as a knowledge base in support of a protection system analysis expert system to predict, validate or even diagnose future unknown relay events. …”
    Get full text
    Get full text
    Get full text
    Article