Search Results - flows protection algorithm
Search alternatives:
- protection algorithm »
- flows protection »
-
1
Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm
Published 2016“…The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
Get full text
Get full text
Thesis -
2
Modular motor driver with torque control for gripping mechanism
Published 2023“…The core of the project lies in the capability of the algorithm to regulate PWM to the motor by sensing the average current flow. …”
Conference paper -
3
Protection Coordination Toward Optimal Network Reconfiguration and DG Sizing
Published 2019“…Without sufficient attention given to the protection coordination during NR, there is a possibility for the protective devices to miscoordinate and consequently lead to system blackout, due to changes in current flow and fault level. …”
Get full text
Get full text
Article -
4
Towards enhancing power system protection in distribution systems with distributed generation: a graph theory-based systematic relay placement approach
Published 2024“…The study aims to address protection system issues associated with connecting DGs, such as tripping of production units, blinding of protection, and undesirable islanding. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Just Queuing: Policy-Based Scheduling Mechanism for Packet Switching Networks
Published 2011“…This research adopts the restricted charge policy which imposes the protection of normal user. In terms of the complexity property, genetic algorithm has an advantage in holding the fitness score of the queue in separate storage space which potentially minimises the complexity of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Optimal coordination of overcurrent relay protection using evolutionary programming / Noor Shah Rizal Abdul Manap
Published 2018“…Directional overcurrent relay is mainly used for the primary protection of ring distribution systems as the same magnitude of fault current can flow in either direction. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Tracing generators' output in transmission open access
Published 2007“…Thus, models and tracing algorithms will become very heuristic in order to allocate the power flow and loss in transmission networks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A Two-Layer Framework for Mitigating the Congestion of Urban Power Grids Based on Flexible Topology with Dynamic Thermal Rating
Published 2025“…In the upper-layer, the particle swarm optimization algorithm is employed to optimize the power supply distribution (PSD) of substation transformers. …”
Article -
10
Fault-current predetermination using time- limited CT secondary side measurements by the covariance-Prony method
Published 2004“…During major faults, excessive fault currents with decaying DC components could flow through the primary of the CT, causing core saturation and a consequent malfunction of the protection system. …”
Get full text
Get full text
Get full text
Article -
11
Monitoring cathodic protection system for underground pipeline
Published 2013“…Sacrificial method is normally used in smaller scale protection and impressed current method is suitable in a dynamic environment or larger scale of protection. …”
Get full text
Get full text
Thesis -
12
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
13
AI recommendation penetration testing tool for SQL injection: linear regression
Published 2025“…The project objective is to apply an AI linear regression algorithm to improve not only the efficiency and flexibility of penetration testing but also to provide strong protection against many cybersecurity threats by suggesting the suitable tools. …”
Get full text
Get full text
Get full text
Article -
14
Long-term rain attenuation probability and site diversity gain prediction formulas
Published 2007“…It includes the designing of algorithm flow which incorporated into MATLAB programming software. …”
Get full text
Get full text
Thesis -
15
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. Hence, there is a need for development of techniques and schemes to obfuscate sensitive parts of software to protect it from reverse engineering attacks. …”
Get full text
Get full text
Thesis -
16
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
Published 2006“…SNT-AC uses an admission control algorithm to restrict flows in and out of the BSS. …”
Get full text
Get full text
Thesis -
17
Design and development of a prototype charge controller for a PV-battery-generator hybrid power system / Sulaiman Shaari, Anuar Ahmad and Shahril Irwan Sulaiman
Published 2006“…In this project, the controller is upgraded using fuzzy algorithm. This fuzzy-logic based charge controller provides a higher class of intelligence to the system. …”
Get full text
Get full text
Research Reports -
18
IoT based drainage monitoring system
Published 2023“…By deploying sensors and devices within the drainage infrastructure, the system continuously collects data on water flow rates, levels, and quality. This real-time data is wirelessly transmitted to a central monitoring system, where it is analysed using advanced algorithms. …”
Get full text
Get full text
Get full text
Article -
19
Blind signature / Musfirah Mohd Ali
Published 2005“…In this chapter 5 the overall architecture of the system, the data flow diagram and the system interface prototype is presented. …”
Get full text
Get full text
Thesis -
20
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…With the increasing availability of video data from surveillance cameras and social media platforms, the need for accurate and efficient violence detection algorithms has become paramount. Automated violence detection systems can aid law enforcement agencies in identifying and responding to violent incidents promptly, thereby preventing potential threats and ensuring public protection. …”
Get full text
Get full text
Get full text
Article
