Search Results - (( developing flows protection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- protection algorithm »
- implication based »
- developing flows »
- flows protection »
- java implication »
-
1
Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm
Published 2016“…The specific aims in employing DEAM-based SPCS are to investigate a strategy to resolve the line overloading issue through the N-1 contingency based on the load flow analysis and the severity index develop SPCS scheme through the generation rescheduling strategy based on the hybrid DEAM algorithm. …”
Get full text
Get full text
Thesis -
2
Modular motor driver with torque control for gripping mechanism
Published 2023“…The core of the project lies in the capability of the algorithm to regulate PWM to the motor by sensing the average current flow. …”
Conference paper -
3
-
4
-
5
Tracing generators' output in transmission open access
Published 2007“…Thus, models and tracing algorithms will become very heuristic in order to allocate the power flow and loss in transmission networks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…There is also a need to develop a tool that contains the three approaches where the developer can customize the protection of the source code.…”
Get full text
Get full text
Thesis -
7
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
8
Monitoring cathodic protection system for underground pipeline
Published 2013“…Sacrificial method is normally used in smaller scale protection and impressed current method is suitable in a dynamic environment or larger scale of protection. …”
Get full text
Get full text
Thesis -
9
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
10
-
11
AI recommendation penetration testing tool for SQL injection: linear regression
Published 2025“…This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
Get full text
Get full text
Get full text
Article -
12
Blind signature / Musfirah Mohd Ali
Published 2005“…The aim for this project is to develop reliable software which is capable to protect the data integrity and authenticity using blind signature method. …”
Get full text
Get full text
Thesis -
13
Student Luggage Storage System (SLSS) / Sofea Aida Sallehan
Published 2020Get full text
Get full text
Thesis -
14
Video surveillance: Item monitoring against theft
Published 2023“…Here, we have developed an intelligent video surveillance system that is capable of identifying the close loitering event and monitoring the select item in the scene by integrating these approaches, such as the You-Only-Look-Once (YOLO) version 5 object detection algorithm, close-contact detection, feature matching, significant movement and dissimilarity detections. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…With the increasing availability of video data from surveillance cameras and social media platforms, the need for accurate and efficient violence detection algorithms has become paramount. Automated violence detection systems can aid law enforcement agencies in identifying and responding to violent incidents promptly, thereby preventing potential threats and ensuring public protection. …”
Get full text
Get full text
Get full text
Article -
16
Artificial immune systems (GA-AIS) enabled power loss mitigation in distributed generation: X3PAIS optimization approaches
Published 2025“…Researchers have been interested in the Artificial Immune System (AIS) algorithm, which has room for development and lacks a fixed template. …”
Article -
17
