Search Results - (( using function new algorithm ) OR ( loading classification using algorithm ))

Refine Results
  1. 1

    Electricity load profile determination by using fuzzy C-means and probability neural network / Norhasnelly Anuar by Anuar, Norhasnelly

    Published 2015
    “…The objectives of this project are to use FCM as the clustering algorithm to establish TLPs. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM) by Shamim, Akhtar

    Published 2024
    “…It is a well-established fact that machine learning is outperforming in terms of prediction and classification. Therefore, in this study a new optimized variant of machine learning algorithms is presented. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Development of collision avoidance warning system for heavy vehicles featuring adaptive minimum safe distance / Airul Sharizli Abdullah by Airul Sharizli, Abdullah

    Published 2017
    “…To represent the adaptive minimum safe distance which will be used in activation algorithm for CAWS, the new distance-based CAWS model, namely Minimum Safe Distance Gap (MSDG) is introduced. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Intuitive content management system via manipulation and duplication with if-else rules classification by Chan, Chung Hoong

    Published 2018
    “…As a result, ICMS can transform dynamic websites into static websites with faster load speed using manipulation method mixed with data mining classification prediction and Boyer-Moore Horspool algorithm which can be classified, edited, adjustable and searched more precisely. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Assessment of cognitive load using multimedia learning and resting states with deep learning perspective by Qayyum, A., Faye, I., Malik, A.S., Mazher, M.

    Published 2019
    “…The brain waves were extracted using discrete wavelet transform (DWT) for each segment and fed these segments to proposed model for classification and assessment of cognitive load. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Review of Plug-Based Load Energy Management Systems (PLEMS) for energy and comfort management of buildings by Amin, F.B.M., Mahmood, A.K.

    Published 2016
    “…The global energy consumption has risen significantly for the last few years that contributed to the large amount of Carbon Dioxide (CO2). Plug-based load equipments has been identified as one crucial component of whole-building energy use. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Development of Phasor Measurement Unit Based Fault Detection and Faulty Line Classification in Electrical Power System by Muhammad Qasim, Khan

    Published 2019
    “…Thirdly, for a faulty line classification (FLC), this study develops the current angles differential scheme by introducing unwrapped dynamic phase angles using the modified PMU measurements. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of electromyography-controlled 3D printed robot hand and supervised machine learning for signal classification by Abdul Wahit, Mohamad Aizat

    Published 2019
    “…The current study of the hand posture classification requires a higher number of EMG sensor used to achieve an accurate classification performance that leads the system to be complicated. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An efficient computation technique for cryptosystems based on Lucas functions by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2008
    “…We have found that the binary sequence used in a new algorithm is shorter than a special sequence used in an existing algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…Next, the Dynamic Demand Replacement Algorithm (DDRA) algorithm is used to place in-demand functions near the edge nodes periodically, while the proposed task scheduling algorithm - Maximum Revenue Bid (MRB) is used to give priority to tasks to maximise revenue near the edge. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    New heuristic function in ant colony system for the travelling salesman problem by Alobaedy, Mustafa Muwafak, Ku-Mahamud, Ku Ruhana

    Published 2012
    “…However, one part of the algorithm, called heuristic function, is not updated at any time throughout the process to reflect the new information discovered by the ants.This paper proposes an Enhanced Ant Colony System algorithm for solving the Travelling Salesman Problem.The enhanced algorithm is able to generate shorter tours within reasonable times by using accumulated values from pheromones and heuristics.The proposed enhanced ACS algorithm integrates a new heuristic function that can reflect the new information discovered by the ants. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Power system security assessment using artificial neural network: article / Mohd Fathi Zakaria by Zakaria, Mohd Fathi

    Published 2010
    “…This paper presented an application of Artificial Neural Network (ANN) in steady state stability classifications. A multi layer feed forward ANN with Back Propagation Network algorithm is proposed in determining the steady state stability classifications. …”
    Get full text
    Get full text
    Article
  16. 16

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…I used different types of optimization algorithms to improve the performance of the neural networks. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations by Mohd Ali, Fakariah Hani

    Published 2004
    “…The principle benefit of using this new approach over the transform from Rijndael block cipher is speed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Designing New Block Cipher Based On Genetic Algorithm Approach by Nur Hafiza Binti Zakaria, Ramlan Mahmod, Nur Izura Udzir, Zuriati Ahmad Zukarnain, Suriyani Ariffin

    Published 2024
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Article
  19. 19

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…New technique shows a smaller computation time compared to the existing algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Service based load balance mechanism using software-defined networks / Ahmed Abdelaziz Abdelltif Osman by Ahmed Abdelaziz, Abdelltif Osman

    Published 2017
    “…The SDN controller is leveraged to provide online flow classification. The proposed mechanism is evaluated using benchmarking experiments and validated using a statisticalmodel. …”
    Get full text
    Get full text
    Get full text
    Thesis