Search Results - (( developing flows protection algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm by Hadi, Mahmaad Khalid

    Published 2016
    “…The specific aims in employing DEAM-based SPCS are to investigate a strategy to resolve the line overloading issue through the N-1 contingency based on the load flow analysis and the severity index develop SPCS scheme through the generation rescheduling strategy based on the hybrid DEAM algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…The core of the project lies in the capability of the algorithm to regulate PWM to the motor by sensing the average current flow. …”
    Conference paper
  3. 3
  4. 4
  5. 5

    Tracing generators' output in transmission open access by Sulaiman, Mohd. Herwan, Aliman, Omar, Mustafa, Mohd. Wazir, Daut, Ismail

    Published 2007
    “…Thus, models and tracing algorithms will become very heuristic in order to allocate the power flow and loss in transmission networks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…There is also a need to develop a tool that contains the three approaches where the developer can customize the protection of the source code.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Monitoring cathodic protection system for underground pipeline by Thai, Seng Choong

    Published 2013
    “…Sacrificial method is normally used in smaller scale protection and impressed current method is suitable in a dynamic environment or larger scale of protection. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    AI recommendation penetration testing tool for SQL injection: linear regression by Ahmad Fuad, Norshahira Elliyana, Saad, Shahadan

    Published 2025
    “…This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Blind signature / Musfirah Mohd Ali by Musfirah, Mohd Ali

    Published 2005
    “…The aim for this project is to develop reliable software which is capable to protect the data integrity and authenticity using blind signature method. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Video surveillance: Item monitoring against theft by Chong, Yiing Sheah

    Published 2023
    “…Here, we have developed an intelligent video surveillance system that is capable of identifying the close loitering event and monitoring the select item in the scene by integrating these approaches, such as the You-Only-Look-Once (YOLO) version 5 object detection algorithm, close-contact detection, feature matching, significant movement and dissimilarity detections. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios by MUHAMMAD, SHOAIB, ASAD, ULLAH, Irshad, Ahmed Abbasi, Fahad, Algarni, Adnan Shahid, Khan

    Published 2022
    “…With the increasing availability of video data from surveillance cameras and social media platforms, the need for accurate and efficient violence detection algorithms has become paramount. Automated violence detection systems can aid law enforcement agencies in identifying and responding to violent incidents promptly, thereby preventing potential threats and ensuring public protection. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Artificial immune systems (GA-AIS) enabled power loss mitigation in distributed generation: X3PAIS optimization approaches by Ahmed O.A., Chong K.H., Koh S.P., Yaw C.T., Pasupuleti J.

    Published 2025
    “…Researchers have been interested in the Artificial Immune System (AIS) algorithm, which has room for development and lacks a fixed template. …”
    Article
  17. 17