Search Results - (( user prevention mechanism algorithm ) OR ( based optimization isotherm algorithm ))*

Refine Results
  1. 1

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Advanced current and power consumption monitoring with overload protection / Dinie Haqeemy Abdul Mu'izz by Abdul Mu'izz, Dinie Haqeemy

    Published 2024
    “…The system continuously monitors the load on the system and uses advanced algorithms detect and prevent overloads. In the event of an impending overload, the system takes appropriate precautions to reduce the danger, such as automatically shedding non-critical loads or warning the user to act. …”
    Get full text
    Get full text
    Student Project
  3. 3

    A gauss-newton approach for nonlinear optimal control problem with model-reality differences by Sie, Long Kek, Jiao, Li, Leong, Wah June, Abd Aziz, Mohd Ismail

    Published 2017
    “…Here, the linear model-based optimal control model is considered, so as the optimal control law is constructed. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network by Al-Mayouf, Y.R.B., Ismail, M., Abdullah, N.F., Wahab, A.W.A., Mahdi, O.A., Khan, S., Choo, R.K.K.

    Published 2016
    “…Therefore, this paper proposes a novel routing algorithm called efficient and stable routing algorithm based on user mobility and node density (ESRA-MD). …”
    Get full text
    Get full text
    Article
  5. 5

    Adaptive and optimized radio resource allocation algorithms for OFDMA based networks by Saadat, Md. Nazmus

    Published 2015
    “…Also, users with better channels may continuously enjoy highest amount of radio resources, starving others with poorer channels or preventing new users from entering the network. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Production and characterization of biochar derived from oil palm wastes, and optimization for zinc adsorption by Zamani, Seyed Ali

    Published 2015
    “…The incremental back propagation algorithm demonstrated the best results and which has been used as learning algorithm for ANN in combination with Genetic Algorithm in the optimization. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks by Malekzadeh, Mina

    Published 2011
    “…The experiments were used to determine reliability of the simulation tool, analyze behavior of the proposed models and determine their capabilities to prevent wireless DoS and replay attacks, determine detection accuracy of the proposed models, compare effectiveness of the proposed models, verify lifetime overhead and security cost of the proposed models, and evaluate performance of the replay-preventing mechanism. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism by Pourvakhshouri, Seyedeh Zahra

    Published 2008
    “…General rates given to the mechanism by two groups of users were 82 and 85 percent with a + 3.66 percent of uncertainty that was issued a high verification value. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Modeling of Cu(II) adsorption from an aqueous solution using an Artificial Neural Network (ANN) by Khan, T., Manan, T.S.B., Isa, M.H., Ghanim, A.A.J., Beddu, S., Jusoh, H., Iqbal, M.S., Ayele, G.T., Jami, M.S.

    Published 2020
    “…The Fletcher-Reeves conjugate gradient backpropagation (BP) algorithm was the best fit among all of the tested algorithms (mean squared error (MSE) of 3.84 and R2 of 0.989). …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Modelling and simulation of hollow profile aluminium extruded product by Sulaiman, Shamsuddin, Baharudin, B. T. Hang Tuah, Mohd Ariffin, Mohd Khairol Anuar, Magid, Hani Mizhir

    Published 2015
    “…This process is an isothermal process with an extrusion ratio of 3.3. Subsequently, the optimized algorithm for these extrusion parameters was suggested based on the simulation results. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Modeling of cu(ii) adsorption from an aqueous solution using an artificial neural network (ann) by Khan, Taimur, Abd Manan, Teh Sabariah, Hasnain Isa, Mohamed, A. J. Ghanim, Abdulnoor, Beddu, Salmia, Jusoh, Hisyam, Iqbal, Muhammad Shahid, Ayele, Gebiaw T, Jami, Mohammed Saedi

    Published 2020
    “…The Fletcher–Reeves conjugate gradient backpropagation (BP) algorithm was the best fit among all of the tested algorithms (mean squared error (MSE) of 3.84 and R2 of 0.989). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…Second-order injections are also difficult to prevent as the point of injection differs from the point of attack, and therefore more care should be taken to detect and prevent them. …”
    Get full text
    Get full text
    Thesis