Search Results - (( user prevention mechanism algorithm ) OR ( based optimization steam algorithm ))*

Refine Results
  1. 1

    Neuro-Fuzzy and Particle Swarm Optimization based Model for the Steam and Cooling sections of a Cogeneration and Cooling Plant by Alemu Lemma, Tamiru, Rangkuti, Chalillullah, Mohd Hashim, Fakhruldin

    Published 2009
    “…Neuro-fuzzy approach trained by a sequence of optimization algorithms-Particle Swarm Optimization (PSO) followed by Back-Propagation (BP)-is used to develop models for the steam drum pressure, steam drum water level, steam flow rate and chilled water supply temperature. …”
    Get full text
    Conference or Workshop Item
  2. 2

    SYSTEMATIC DESIGN ALGORITHM FOR ENERGY EFFICIENT AND COST EFFECTIVE HYDROGEN PRODUCTION FROM PALM WASTE by INAYAT, ABRAR

    Published 2012
    “…In the current study, a systematic autonomous algorithm incorporating reaction kinetics model, flowsheet calculations, heat integration analysis and economic evaluation, has been developed to calculate optimum parameters giving minimum hydrogen production cost using optimization strategies. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Optimization of stiffened panel fatigue life by using finite element analysis by Mazlan, Shahan

    Published 2020
    “…The multi-objective genetic algorithm which selects the design points based on Pareto optimal design combined with the adaptive multi-objective algorithm method which uses an optimal space-filling was shown to be efficient for time limitation and budget. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Advanced current and power consumption monitoring with overload protection / Dinie Haqeemy Abdul Mu'izz by Abdul Mu'izz, Dinie Haqeemy

    Published 2024
    “…The system continuously monitors the load on the system and uses advanced algorithms detect and prevent overloads. In the event of an impending overload, the system takes appropriate precautions to reduce the danger, such as automatically shedding non-critical loads or warning the user to act. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Temperature control of a pilot plant reactor system using a genetic algorithm model‐based control approach by Wahab, Ahmad Khairi Abdul, Hussain, Mohd Azlan, Omer, Rosli

    Published 2007
    “…The work described in this paper aims at exploring the use of an artificial intelligence technique, i.e. genetic algorithm (GA), for designing an optimal model-based controller to regulate the temperature of a reactor. …”
    Get full text
    Get full text
    Article
  7. 7

    Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network by Al-Mayouf, Y.R.B., Ismail, M., Abdullah, N.F., Wahab, A.W.A., Mahdi, O.A., Khan, S., Choo, R.K.K.

    Published 2016
    “…Therefore, this paper proposes a novel routing algorithm called efficient and stable routing algorithm based on user mobility and node density (ESRA-MD). …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Adaptive and optimized radio resource allocation algorithms for OFDMA based networks by Saadat, Md. Nazmus

    Published 2015
    “…Also, users with better channels may continuously enjoy highest amount of radio resources, starving others with poorer channels or preventing new users from entering the network. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Development of optimized maintenance scheduling model for coal-fired power plant boiler by Noor Fazreen Binti Ahmad Fuzi, Ms.

    Published 2023
    “…The optimal schedules obtained were compared with the actual based on parameters and judgement from power plant planning team. …”
    text::Thesis
  13. 13

    A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks by Malekzadeh, Mina

    Published 2011
    “…The experiments were used to determine reliability of the simulation tool, analyze behavior of the proposed models and determine their capabilities to prevent wireless DoS and replay attacks, determine detection accuracy of the proposed models, compare effectiveness of the proposed models, verify lifetime overhead and security cost of the proposed models, and evaluate performance of the replay-preventing mechanism. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Improving the environmental impact of palm kernel shell through maximizing its production of hydrogen and syngas using advanced artificial intelligence by Rezk, H., Nassef, A.M., Inayat, A., Sayed, E.T., Shahbaz, M., Olabi, A.G.

    Published 2019
    “…The main target of this research is to improve the production of hydrogen and syngas from palm kernel shell (PKS) steam gasification through defining the optimal operating parametersâ�� using a modern optimization algorithm. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism by Pourvakhshouri, Seyedeh Zahra

    Published 2008
    “…General rates given to the mechanism by two groups of users were 82 and 85 percent with a + 3.66 percent of uncertainty that was issued a high verification value. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article