Search Results - (( developing flows prevention algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- prevention algorithm »
- implication based »
- developing flows »
- flows prevention »
- java implication »
-
1
Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage
Published 2010“…This paper proposed that, combination of two algorithms into one learning algorithm for predicting mass flow rate of a flow with leakage resulting in a better mass prediction error as compared to a model with single learning algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
2
Ensemble dual recursive learning algorithms for identifying flow with leakage
Published 2010“…This paper proposed that, combination of two algorithms into one learning algorithm for predicting mass flow rate of a flow with leakage resulting in a better mass prediction error compare to a model with single learning algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
3
Optimal load shedding in power system using back tracking search algorithm
Published 2024text::Final Year Project -
4
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
5
-
6
Power system intentional islanding for different contingency scenarios using discrete optimization technique
Published 2023“…In addition, the results of the case studies (with critical line outage) showed that the MDEP algorithm was able to obtain the optimal intentional islanding strategy with minimal power flow disruption.…”
text::Thesis -
7
An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa
Published 2020“…Ischemic stroke is triggered by an obstruction in the blood vessel of the brain, preventing the blood to flow to the brain tissues region. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Identification Of Flow Blockage Levels In Centrifugal Pump By Machine Learning
Published 2021“…The purpose of this research is to develop an effective machine learning model for the classification of flow blockage levels in the centrifugal pump by using the statistically significant features from vibration and acoustic analysis. …”
Get full text
Get full text
Monograph -
9
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
10
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Machine Learning is one of the ways as a preventive method by applying the data collected from the clogging experiment in the vibration lab to build up a machine learning model for classification of flow blockage levels in the centrifugal pump. …”
Get full text
Get full text
Monograph -
11
Intentional Islanding Solution Based on Modified Discrete Particle Swarm Optimization Technique
Published 2023Conference Paper -
12
Distributed Denial-of-Service Defense System
Published 2006“…The scope of study will coverthe aspect of howthe attack detection algorithms work and identify the attack traffic, hence develop appropriate attack responses. …”
Get full text
Get full text
Final Year Project -
13
Optimization of zinc oxide surge arrester design in reducing leakage current / Nurul Ain Abdul Latiff
Published 2018“…A surge arrester diverts lightning surge to earth, preventing damage on electrical systems. Under normal operating condition, surge arresters do not conduct current but there is a leakage current flow across surge arresters. …”
Get full text
Get full text
Get full text
Thesis -
14
Bat algorithm and neural network for monthly streamflow prediction
Published 2023“…Therefore, this study proposed on the development of streamflow prediction model AI techniques namely Bat algorithm (BA) and backpropagation neural network (BPNN). …”
Conference Paper -
15
Deep reinforcement learning-based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles
Published 2022“…Two aspects (single-agent and multiagent) have assessed the efficiency of algorithms. Every aspect has been analyzed regarding the traffic flows: (1) the controlling efficiency of unexpected traffic situations by the sudden slowdown, (2) abrupt lane change, and (3) smoothly reaching the destination. …”
Get full text
Get full text
Get full text
Article -
16
Deep reinforcement learning based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles
Published 2022“…Two aspects (single-agent and multi-agent) have assessed the efficiency of algorithms. Every aspect has been analyzed regarding the traffic flows: (1) the controlling efficiency of unexpected traffic situations by the sudden slowdown, (2) abrupt lane change, and (3) smoothly reaching the destination. …”
Get full text
Get full text
Get full text
Article -
17
Crowd behavior monitoring using self-adaptive social force model
Published 2019“…This algorithm is jointly used with Horn-Schunck optical flow as a motion detector for the input video. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
Get full text
Get full text
Thesis -
19
Video surveillance: explosion detection
Published 2025“…Thus, this research focusses on developing an intelligent explosion detection surveillance system that is capable of early and accurate explosion detection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…There is also a need to develop a tool that contains the three approaches where the developer can customize the protection of the source code.…”
Get full text
Get full text
Thesis
