Search Results - (( model implication tree algorithm ) OR ( _ protection based algorithm ))

Refine Results
  1. 1

    Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar by Ja'afar, Nur Shahirah

    Published 2021
    “…This algorithms were selected based on previous literature review in price prediction. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary by Mohd Zamary, Nurul Aida

    Published 2024
    “…This project aims to develop a decision-making support model for diabetes diagnosis and treatment recommendation using the decision tree algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti by Abd Mokti, Nurnazifah

    Published 2024
    “…This research project focuses on developing a laptop price prediction model using the decision tree algorithm based on laptop specifications. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud by Shariff, S. Sarifah Radiah, Hud, Hady

    Published 2023
    “…Practical implications In terms of managerial implications, the findings in this research help to frame the adoption of a more advanced analytical approach to forecasting, using a Machine Learning algorithm, in solving a newsvendor problem. …”
    Get full text
    Get full text
    Book Section
  8. 8

    A novel MPPT algorithm for load protection based on output sensing control by Hassani, M., Mekhilef, Saad, Patrick Hu, A., Watson, N.R.

    Published 2011
    “…This paper presents a novel maximum power point tracking (MPPT) algorithm for load protection based on output sensing control. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…A distance protective relay performance analysis is only feasible when the hypothesis of expected relay operation characteristics as decision rules is established as the knowledge base. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Genetic algorithm-based optimization of overcurrent relay Coordination for improved protection of DFIG operated wind farms by Rezaei, Nima, Uddin, Mohammad Nasir, Amin, Ifte Khairul, Othman, Mohammad Lutfi

    Published 2019
    “…Therefore, this article proposes a novel genetic algorithm (GA)-based optimization technique for proper coordination of the OCRs in order to provide improved protection of the wind farms. …”
    Get full text
    Get full text
    Article
  11. 11

    Genetic algorithm based optimization of overcurrent relay coordination for improved protection of DFIG operated wind farms by Rezaei, Nima, Uddin, Mohammad Nasir, Amin, Ifte Khairul, Othman, Mohammad Lutfi, Marsadek, Marayati

    Published 2018
    “…Therefore, this research proposes a novel genetic algorithm (GA) based optimization for proper coordination of OCRs to improve their functions for protection of wind farms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm by Hadi, Mahmaad Khalid

    Published 2016
    “…The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Othman, Mohammad Ridzal, Osman, Harussaleh

    Published 2011
    “…This paper investigates the implementation of a novel data mining approach of integrated-Rough-Set-and-Genetic-Algorithm based rule discovery and Rule Quality Measure to hypothesize expected relay behavior in the form of an association rule from digital protective relay’s resident event report. …”
    Get full text
    Get full text
    Article
  14. 14

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys by Khalaf, Emad Taha, Mohammed, Muamer N., Kohbalan, Moorthy, Hasan, Raed Abdulkareem

    Published 2018
    “…In this paper we proposed an efficient encryption method based on two invertible and random keys to enhance and overcome the weakness of hill cipher algorithm the keys generated using upper triangular matrices with Pseudo-Random Number Generator (PRNG) using two large and random encryption keys. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…This derived algorithm, aptly known as relay CD-prediction rules, can later be used as a knowledge base in support of a protection system analysis expert system to predict, validate or even diagnose future unknown relay events. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20