Search Results - (( developing point predictor algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Continuation power flow for voltage stability assessment / Mohd Zamri Laton by Laton, Mohd Zamri

    Published 2006
    “…The continuation power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Numerical approach for delay volterra integro-differential equation by Nur Auni Baharum, Zanariah Abdul Majid, Norazak Senu, Haliza Rosali

    Published 2022
    “…The proposed block method of order three is formulated using Taylor expansion and will simultaneously approximate the numerical solution at two points. The 2PBM method is developed by combining the predictor and corrector formulae in the PECE mode. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Numerical approach for delay Volterra integro-differential equation by Baharum, Nur Auni, Abdul Majid, Zanariah, Senu, Norazak, Rosali, Haliza

    Published 2022
    “…The proposed block method of order three is formulated using Taylor expansion and will simultaneously approximate the numerical solution at two points. The 2PBM method is developed by combining the predictor and corrector formulae in the PECE mode. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    2 Point Block Backward Difference Method for Solving Riccati Type Differential Problems by bin Rasedee, AFN, Sathar, MHBA, Deraman, F, Ijam, HM, bin Suleiman, M, Saaludin, NB, Rakhimov, A

    Published 2024
    “…Based on a predictor-corrector two point block backward difference method (2PBBD), a code is developed using a set of integration coefficients that eliminates the need to be calculated at every step change. …”
    Article
  8. 8

    One-step block methods for solving ordinary and delay differential equations by Mohd Radzi, Hazwani

    Published 2011
    “…The algorithm which is based on the predictor-corrector scheme of Adams type was then extended from two up to six point one step block method. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Direct two-point block methods for solving nonstiff higher order Ordinary Differential Equations using Backward Difference formulation by Mohd Ijam, Hazizah

    Published 2014
    “…This thesis describes the development of a Two-Point Block Backward Difference method (2PBBD) for solving system of nonstiff higher order Ordinary Differential Equations (ODEs) directly. …”
    Get full text
    Get full text
    Thesis
  10. 10

    2 point block backward difference method for solving Riccati type differential problems by Rasedee, Ahmad Fadly Nurullah, Abdul Sathar, Mohammad Hasan, Deraman, Fatanah, Rakhimov, Abdumalik

    Published 2016
    “…A two point block backward difference method is established to solve Riccati differential equations directly.Based on a predictor-corrector two point block backward difference method (2PBBD), a code is developed using a set of integration coefficients that eliminates the need to be calculated at every step change. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    2 point block backward difference method for solving Riccati type differential problems by Rasedee, Ahmad Fadly Nurullah, Abdul Sathar, Mohammad Hasan, Deraman, Fatanah, Mohd Ijam, Hazizah, Suleiman, Mohamed, Saaludin, Nurashikin, Rakhimov, Abdumalik

    Published 2016
    “…Based on a predictor-corrector two point block backward difference method (2PBBD), a code is developed using a set of integration coefficients that eliminates the need to be calculated at every step change. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Voltage stability assessment via continuation power flow method / Zamri Laton, Ismail Musiri and Titik Khawa Abdul Rahman by Laton, Zamri, Musiri, Ismail, Abdul Rahman, Titik Khawa

    Published 2008
    “…The solvability of power flow at the bifurcation point beyond the maximum loadability point of a system was achieved through the implementation of predictor-corrector technique. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Variable step size and order strategy for delay differential equations in PIE(CIE)s mode by Abdul Aziz, Nurul Huda, Abdul Majid, Zanariah

    Published 2014
    “…The purpose here is to enhance the efficiency of the developed predictor-corrector algorithm in the capability to vary automatically not only for the step size, but the order of the method employed as well. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data by Baba, Ishaq Abdullahi

    Published 2022
    “…However, it cannot be applied when the sample size is less than the number of predictor variables. In addressing this problem, some robust procedures for high dimensional dataset via the RFCH algorithm are developed. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20