Search Results - (( model implication from algorithm ) OR ( _ protection based algorithm ))

Refine Results
  1. 1

    Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar by Ja'afar, Nur Shahirah

    Published 2021
    “…These algorithms were developed by using prewar shophouses dataset from 2004 until 2018 based on factors of heritage properties. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology by Muhammad Hassif Imran, Muhammad Harris Irwan, Johari, Abdullah, Adnan Shahid, Khan, Nayeem Ahmad, Khan

    Published 2025
    “…The findings demonstrate that blockchain technology can play a crucial role in protecting cultural heritage, offering a replicable model for other traditional crafts facing similar challenges. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A novel MPPT algorithm for load protection based on output sensing control by Hassani, M., Mekhilef, Saad, Patrick Hu, A., Watson, N.R.

    Published 2011
    “…This paper presents a novel maximum power point tracking (MPPT) algorithm for load protection based on output sensing control. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…A distance protective relay performance analysis is only feasible when the hypothesis of expected relay operation characteristics as decision rules is established as the knowledge base. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Genetic algorithm-based optimization of overcurrent relay Coordination for improved protection of DFIG operated wind farms by Rezaei, Nima, Uddin, Mohammad Nasir, Amin, Ifte Khairul, Othman, Mohammad Lutfi

    Published 2019
    “…Therefore, this article proposes a novel genetic algorithm (GA)-based optimization technique for proper coordination of the OCRs in order to provide improved protection of the wind farms. …”
    Get full text
    Get full text
    Article
  7. 7

    Genetic algorithm based optimization of overcurrent relay coordination for improved protection of DFIG operated wind farms by Rezaei, Nima, Uddin, Mohammad Nasir, Amin, Ifte Khairul, Othman, Mohammad Lutfi, Marsadek, Marayati

    Published 2018
    “…Therefore, this research proposes a novel genetic algorithm (GA) based optimization for proper coordination of OCRs to improve their functions for protection of wind farms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm by Hadi, Mahmaad Khalid

    Published 2016
    “…The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Othman, Mohammad Ridzal, Osman, Harussaleh

    Published 2011
    “…This paper investigates the implementation of a novel data mining approach of integrated-Rough-Set-and-Genetic-Algorithm based rule discovery and Rule Quality Measure to hypothesize expected relay behavior in the form of an association rule from digital protective relay’s resident event report. …”
    Get full text
    Get full text
    Article
  10. 10

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys by Khalaf, Emad Taha, Mohammed, Muamer N., Kohbalan, Moorthy, Hasan, Raed Abdulkareem

    Published 2018
    “…In this paper we proposed an efficient encryption method based on two invertible and random keys to enhance and overcome the weakness of hill cipher algorithm the keys generated using upper triangular matrices with Pseudo-Random Number Generator (PRNG) using two large and random encryption keys. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…This derived algorithm, aptly known as relay CD-prediction rules, can later be used as a knowledge base in support of a protection system analysis expert system to predict, validate or even diagnose future unknown relay events. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Differential evolution based special protection and control scheme for contingency monitoring of transmission line overloading by Hadi, Mahmood Khalid, Othman, Mohammad Lutfi, Abdul Wahab, Noor Izzri

    Published 2017
    “…In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution (DE) algorithm for optimal generation rescheduling to mitigate line overloads in contingency conditions has been presented. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Storify : Protecting privacy of social media post with hash-based anonymity by Jackie Chin Yong An

    Published 2022
    “…Questionnaire and quantitative survey is used to gather user requirements. The hash-based algorithm is conducted through testing. The outcome of this proposed project is to confirm the lightweight hash-based anonymity algorithm with the fastest computation speed and greater ciphertext size.…”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  20. 20

    Differential Evolution Based Special Protection and Control Scheme for Contingency Monitoring of Transmission Line Overloading by Othman, Mohammad Lutfi, Hadi, Mahmood Khalid, Abdul Wahab, Noor Izzri

    Published 2017
    “…In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution (DE) algorithm for optimal generation rescheduling to mitigate line overloads in contingency conditions has been presented. …”
    Get full text
    Get full text
    Get full text
    Book Section