Search Results - (( data distribution methods algorithm ) OR ( data distribution connection algorithm ))

Refine Results
  1. 1
  2. 2

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…One of the challenging issues for a grid-connected distributed generation is to find a suitable technique to detect an islanding problem. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Density based subspace clustering: a case study on perception of the required skill by Rahmat Widia, Sembiring

    Published 2014
    “…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Density subspace clustering: a case study on perception of the required skill by Sembiring, Rahmat Widia

    Published 2014
    “…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optimal planning of photovoltaic distributed generation considering uncertainties using monte carlo pdf embedded MVMO-SH by Norhafidzah, Mohd Saad

    Published 2021
    “…The probabilistic values of PV generation and load models are employed as the input data to the load flow analysis for the radial distribution network. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2025
    “…This paper provides an overview of localization algorithms, including centralized and distributed algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Graph theory-based radial load flow analysis to solve the dynamic network reconfiguration problem by Aman, M.M., Jasmon, G.B., Bakar, Ab Halim Abu, Mokhlis, Hazlie, Naidu, K.

    Published 2016
    “…Radial load flow (RLF) methods are frequently used in solving distribution system problems. …”
    Get full text
    Get full text
    Article
  8. 8

    OFF-GRID SOLAR PHOTOVOLTAIC (PV) DESIGN BASED ON FUZZY TECHNIQUE FOR ORDER PERFORMANCE BY SIMILARITY TO IDEAL SOLUTION (TOPSIS) APPROACH by NUR AFIQAH, JAHILAN

    Published 2022
    “…PV technology comprises the grid-connected PV systems and off-grid PV systems. Off-grid PV systems generate and distribute electrical energy independently, unlike the grid-connected PV systems. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9
  10. 10

    Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications by Rafique, Majid

    Published 2025
    “…By using a task scheduling and offloading method, the FOCS algorithm arranges data according to size and sends it to the appropriate fog nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…In this study, several algorithms are proposed to guarantee high efficiency of resource allocations among a variety of smart grid applications (flat priority based and specific priority based scheduling algorithms), such as distribution automation, voice, video surveillance and advanced metering infrastructure. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…Nowadays, in the grid community, distributed and clustering system, a lot of work has been focused on providing efficient and safe replication management services through designing of algorithms and systems. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…On top of that, the existing analysis tools and algorithms did not consider the data generated by sensory devices connected to the Internet. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Systematic review on ai-blockchain based e-healthcare records management systems by Haddad, Alaa, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Hasbullah, Nurul Fadzlin, Zabidi, Suriza Ahmad

    Published 2022
    “…The performance of AI algorithms is enhanced through the data obtained from a data repository or a reliable, secure, trustworthy, and credible platform. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Shallow-water mapping at Pantai Tok Jembal, Terengganu, Malaysia, using Lansat 8 (OLI) / Nur Syahirah Hashim by Hashim, Nur Syahirah

    Published 2021
    “…The problem encountered during the bathymetry derivation process, related to the space, distribution and quantity of the Single-beam echo sounder (SBES) data. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Systematic review on ai-blockchain based e-healthcare records management systems by Haddad, Alaa, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Hasbullah, Nurul Fadzlin, Zabidi, Suriza Ahmad

    Published 2022
    “…The performance of AI algorithms is enhanced through the data obtained from a data repository or a reliable, secure, trustworthy, and credible platform. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article