Search Results - flows protection algorithm

Refine Results
  1. 1

    Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm by Hadi, Mahmaad Khalid

    Published 2016
    “…The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…The core of the project lies in the capability of the algorithm to regulate PWM to the motor by sensing the average current flow. …”
    Conference paper
  3. 3

    Protection Coordination Toward Optimal Network Reconfiguration and DG Sizing by Abdul Rahim, Mohamad Norshahrani, Mokhlis, Hazlie, Bakar, Ab Halim Abu, Rahman, Mir Toufikur, Badran, Ola, Mansor, Nurulafiqah Nadzirah

    Published 2019
    “…Without sufficient attention given to the protection coordination during NR, there is a possibility for the protective devices to miscoordinate and consequently lead to system blackout, due to changes in current flow and fault level. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Just Queuing: Policy-Based Scheduling Mechanism for Packet Switching Networks by Miaji, Yaser Shamsulhak A

    Published 2011
    “…This research adopts the restricted charge policy which imposes the protection of normal user. In terms of the complexity property, genetic algorithm has an advantage in holding the fitness score of the queue in separate storage space which potentially minimises the complexity of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Optimal coordination of overcurrent relay protection using evolutionary programming / Noor Shah Rizal Abdul Manap by Noor Shah Rizal, Abdul Manap

    Published 2018
    “…Directional overcurrent relay is mainly used for the primary protection of ring distribution systems as the same magnitude of fault current can flow in either direction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Tracing generators' output in transmission open access by Sulaiman, Mohd. Herwan, Aliman, Omar, Mustafa, Mohd. Wazir, Daut, Ismail

    Published 2007
    “…Thus, models and tracing algorithms will become very heuristic in order to allocate the power flow and loss in transmission networks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A Two-Layer Framework for Mitigating the Congestion of Urban Power Grids Based on Flexible Topology with Dynamic Thermal Rating by Su Y., Teh J., Luo Q., Tan K., Yong J.

    Published 2025
    “…In the upper-layer, the particle swarm optimization algorithm is employed to optimize the power supply distribution (PSD) of substation transformers. …”
    Article
  10. 10

    Fault-current predetermination using time- limited CT secondary side measurements by the covariance-Prony method by Kamel , Nidal

    Published 2004
    “…During major faults, excessive fault currents with decaying DC components could flow through the primary of the CT, causing core saturation and a consequent malfunction of the protection system. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Monitoring cathodic protection system for underground pipeline by Thai, Seng Choong

    Published 2013
    “…Sacrificial method is normally used in smaller scale protection and impressed current method is suitable in a dynamic environment or larger scale of protection. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    AI recommendation penetration testing tool for SQL injection: linear regression by Ahmad Fuad, Norshahira Elliyana, Saad, Shahadan

    Published 2025
    “…The project objective is to apply an AI linear regression algorithm to improve not only the efficiency and flexibility of penetration testing but also to provide strong protection against many cybersecurity threats by suggesting the suitable tools. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Long-term rain attenuation probability and site diversity gain prediction formulas by Al-Tabatabaie, Kusay Faisal A.

    Published 2007
    “…It includes the designing of algorithm flow which incorporated into MATLAB programming software. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. Hence, there is a need for development of techniques and schemes to obfuscate sensitive parts of software to protect it from reverse engineering attacks. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network by Ng, Roger Cheng Yong

    Published 2006
    “…SNT-AC uses an admission control algorithm to restrict flows in and out of the BSS. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Design and development of a prototype charge controller for a PV-battery-generator hybrid power system / Sulaiman Shaari, Anuar Ahmad and Shahril Irwan Sulaiman by Shaari, Sulaiman, Ahmad, Anuar, Sulaiman, Shahril Irwan

    Published 2006
    “…In this project, the controller is upgraded using fuzzy algorithm. This fuzzy-logic based charge controller provides a higher class of intelligence to the system. …”
    Get full text
    Get full text
    Research Reports
  18. 18

    IoT based drainage monitoring system by Venoth, Abhinaashgovin, Sankaran, Sukhiirtan, Velan, Sheshan, Moganthera Thevar, Atishvar, Saravanan, Sharvin

    Published 2023
    “…By deploying sensors and devices within the drainage infrastructure, the system continuously collects data on water flow rates, levels, and quality. This real-time data is wirelessly transmitted to a central monitoring system, where it is analysed using advanced algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Blind signature / Musfirah Mohd Ali by Musfirah, Mohd Ali

    Published 2005
    “…In this chapter 5 the overall architecture of the system, the data flow diagram and the system interface prototype is presented. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios by MUHAMMAD, SHOAIB, ASAD, ULLAH, Irshad, Ahmed Abbasi, Fahad, Algarni, Adnan Shahid, Khan

    Published 2022
    “…With the increasing availability of video data from surveillance cameras and social media platforms, the need for accurate and efficient violence detection algorithms has become paramount. Automated violence detection systems can aid law enforcement agencies in identifying and responding to violent incidents promptly, thereby preventing potential threats and ensuring public protection. …”
    Get full text
    Get full text
    Get full text
    Article