Search Results - (( model implication from algorithm ) OR ( _ protection based algorithm ))
Search alternatives:
- model implication »
- implication from »
- protection based »
- from algorithm »
- _ protection »
-
1
Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar
Published 2021“…These algorithms were developed by using prewar shophouses dataset from 2004 until 2018 based on factors of heritage properties. …”
Get full text
Get full text
Thesis -
2
Implications of climate change damage for agriculture: sectoral evidence from Pakistan
Published 2023Article -
3
Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology
Published 2025“…The findings demonstrate that blockchain technology can play a crucial role in protecting cultural heritage, offering a replicable model for other traditional crafts facing similar challenges. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
A novel MPPT algorithm for load protection based on output sensing control
Published 2011“…This paper presents a novel maximum power point tracking (MPPT) algorithm for load protection based on output sensing control. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…A distance protective relay performance analysis is only feasible when the hypothesis of expected relay operation characteristics as decision rules is established as the knowledge base. …”
Get full text
Get full text
Thesis -
6
Genetic algorithm-based optimization of overcurrent relay Coordination for improved protection of DFIG operated wind farms
Published 2019“…Therefore, this article proposes a novel genetic algorithm (GA)-based optimization technique for proper coordination of the OCRs in order to provide improved protection of the wind farms. …”
Get full text
Get full text
Article -
7
Genetic algorithm based optimization of overcurrent relay coordination for improved protection of DFIG operated wind farms
Published 2018“…Therefore, this research proposes a novel genetic algorithm (GA) based optimization for proper coordination of OCRs to improve their functions for protection of wind farms. …”
Get full text
Get full text
Conference or Workshop Item -
8
Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm
Published 2016“…The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
Get full text
Get full text
Thesis -
9
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…This paper investigates the implementation of a novel data mining approach of integrated-Rough-Set-and-Genetic-Algorithm based rule discovery and Rule Quality Measure to hypothesize expected relay behavior in the form of an association rule from digital protective relay’s resident event report. …”
Get full text
Get full text
Article -
10
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
Get full text
Get full text
Get full text
Article -
11
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
Published 2018“…In this paper we proposed an efficient encryption method based on two invertible and random keys to enhance and overcome the weakness of hill cipher algorithm the keys generated using upper triangular matrices with Pseudo-Random Number Generator (PRNG) using two large and random encryption keys. …”
Get full text
Get full text
Get full text
Article -
12
Discovering decision algorithm from a distance relay event report
Published 2009“…This derived algorithm, aptly known as relay CD-prediction rules, can later be used as a knowledge base in support of a protection system analysis expert system to predict, validate or even diagnose future unknown relay events. …”
Get full text
Get full text
Get full text
Article -
13
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article -
15
Genetic Algorithm-Based Optimization of Overcurrent Relay Coordination for Improved Protection of DFIG Operated Wind Farms
Published 2023Conference Paper -
16
-
17
Differential evolution based special protection and control scheme for contingency monitoring of transmission line overloading
Published 2017“…In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution (DE) algorithm for optimal generation rescheduling to mitigate line overloads in contingency conditions has been presented. …”
Get full text
Get full text
Conference or Workshop Item -
18
Genetic algorithm based optimization of overcurrent relay coordination for improved protection of DFIG operated wind farms
Published 2023Conference Paper -
19
Storify : Protecting privacy of social media post with hash-based anonymity
Published 2022“…Questionnaire and quantitative survey is used to gather user requirements. The hash-based algorithm is conducted through testing. The outcome of this proposed project is to confirm the lightweight hash-based anonymity algorithm with the fastest computation speed and greater ciphertext size.…”
Get full text
Get full text
Get full text
Academic Exercise -
20
Differential Evolution Based Special Protection and Control Scheme for Contingency Monitoring of Transmission Line Overloading
Published 2017“…In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution (DE) algorithm for optimal generation rescheduling to mitigate line overloads in contingency conditions has been presented. …”
Get full text
Get full text
Get full text
Book Section
