Search Results - data distribution ((based algorithm) OR (((conversion algorithm) OR (control algorithm))))
Search alternatives:
- conversion algorithm »
- data distribution »
-
1
DC-based PV-powered home energy system
Published 2017“…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
Get full text
Get full text
Thesis -
2
Levy Flight Safe Experimentation Dynamics Algorithm for Data-Based PID Tuning of Flexible Joint Robot
Published 2020“…This paper proposes the data-based PID controller of flexible joint robot based on Levy Flight Safe Experimentation Dynamics (LFSED) algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…Then, traffic is fitted to best traffic model and percentage level Policing and Shaping algorithm is developed to control the bandwidth used. …”
Get full text
Get full text
Thesis -
4
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…The objective of this research is to characterize inbound internet traffic collected on real live IP-based campus network. Then, traffic is fitted to best traffic model and percentage level Policing and Shaping algorithm is developed to control the bandwidth used. …”
Get full text
Get full text
Article -
5
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
Get full text
Get full text
Thesis -
6
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
Get full text
Get full text
Article -
7
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…The proposed solution to this problem is based on a general combinatorial optimization algorithm known as Genetic Algorithm, and the load flow equations in distribution network. …”
Get full text
Get full text
Thesis -
8
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
Get full text
Get full text
Thesis -
9
An Optimized Binary Scheduling Controller for Microgrid Energy Management Considering Real Load Conditions
Published 2024“…This study presents an optimal schedule controller for microgrid energy management, utilizing the Binary Particle Swarm algorithm (BPSO) to minimize costs and ensure optimal power delivery to loads. …”
Conference Paper -
10
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…A data parallel algorithm (DPA-EHD) is designed and implemented for the EHD equations. …”
Get full text
Get full text
Thesis -
11
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023text::Thesis -
12
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Predicting Customer Buying Decisions for Online Shopping with Unbalanced Data Set
Published 2022“…Weka, a data mining tool, provides the facility to classify the data set with different machine learning algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
The implementation of fault management in distribution system using distribution automation system (DAS) in conjunction with SCADA
Published 2012“…The operation of controlling and monitoring of electrical power activity or condition in distribution side, typically take at the distribution substation system. …”
Get full text
Get full text
Conference or Workshop Item -
17
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
Get full text
Get full text
Get full text
Article -
18
Topological Clustering via Adaptive Resonance Theory With Information Theoretic Learning
Published 2019“…Other types of the ART-based topological clustering algorithms have been developed, however, these algorithms have various drawbacks such as a large number of parameters, sensitivity to noisy data. …”
Get full text
Get full text
Article -
19
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…In this research, Cuckoo Search Spring Algorithm (CSSA) is proposed to enhance the robustness of algorithm by constructing the optimal network reconfiguration consist of reducing power losses and improve voltage profile with the various loadability factor as the constraint according to load profile, based on single and multiobjective model. …”
Get full text
Get full text
Thesis -
20
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. The major objective of the proposed technique referred to as a Secure Web Access Control (SWAC) is to provide mechanisms for control web access based on user access behavior. …”
Get full text
Get full text
Thesis
