Search Results - (( evolution identification system algorithm ) OR ( data replication optimization algorithm ))

Refine Results
  1. 1

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…Voltage stability problems have been one of the major concerns for electric utilities as a result of a system heavy loading. This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Online Dynamic Replication and Placement Algorithms for Cost Optimization of Online Social Networks in Two-tier Multi-cloud by Ali Y. Aldailamy, Abdullah Muhammed, Rohaya Latip, Nor Asilah Wati Abdul Hamid, Waidah Ismail

    Published 2024
    Subjects: “…Access latency Cost optimization Data placement Data replication Online algorithm Online social network…”
    journal::journal article
  3. 3
  4. 4
  5. 5
  6. 6

    Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution by Tijani, Ismaila B., Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus

    Published 2014
    “…This study proposes a hybrid of conventional back propagation training algorithm for the NARX network and multiobjective differential evolution (MODE) algorithm for identification of a nonlinear model of an unmanned small scale helicopter from experimental flight data.The proposed hybrid algorithm was able to produce models with Pareto-optimal compromise between the design objectives. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Originality/value – This study presents a novel hybrid algorithm for system identification of an autonomous helicopter model.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq

    Published 2024
    “…The paper presents a method for autotuning attitude PID for a quadplane UAV using differential evolution (DE), X-Plane simulation, and neural network (NN)-based system identification. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A dynamic replication aware load balanced scheduling for data grids in distributed environments of internet of things by Bakhshad, Said, Noor, Rafidah Md, Akhundzada, Adnan, Saba, Tanzila, Ahmedy, Ismail, Haroon, Faisal, Nazir, Babar

    Published 2018
    “…Moreover, it becomes even more challenging in the highly dynamic and distributed environment of the Internet of Things (IoT). Replication is considered a key optimization technique in data grids. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq, Yaakub, Mohd Fauzi

    Published 2024
    “…The paper presents a method for autotuning attitude PID for a quadplane UAV using differential evolution (DE), X-Plane simulation, and neural network (NN)-based system identification. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Vigorous replication strategy with balanced quorum for minimizing the storage consumption and response time in cloud environments by Mohd Ali, Fazlina, Latip, Rohaya, Alrshah, Mohamed A., Abdullah, Azizol, Ibrahim, Hamidah

    Published 2021
    “…Essentially, cloud replication must be able to secure huge data by enabling comprehensive replication strategies, optimal data availability, fast data retrieval, and cost-effective data management and maintenance. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Dynamic replica replacement strategy in data grid by Soosai, Alexis M., Abdullah, Azizol, Othman, Mohamed, Latip, Rohaya, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2012
    “…Data replication strategy is widely adopted for large scale data-intensive applications in distributed network such as data grid. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Performance of well known packet scheduling algorithms in the downlink 3GPP LTE system by Mohd Ramli, Huda Adibah, Basukala, Riyaj, Sandrasegaran, Kumbesan, Patachaianand, Rachod

    Published 2009
    “…This paper contributes to the identification of a suitable packet scheduling algorithm for use in the downlink 3GPP LTE system supporting video streaming services. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…In addition, the structural parameters of a system can be accurately estimated through the proposed system identification methods for both cases of linear and nonlinear conditions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification by Talpur, N., Abdulkadir, S.J., Hasan, M.H., Alhussian, H., Alwadain, A.

    Published 2023
    “…The SCSO algorithm replicates the hunting and searching strategies of the sand cat while having the advantage of avoiding local optima and finding the ideal solution with minimal control variables. …”
    Get full text
    Get full text
    Article
  19. 19

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Fingerprint frontier: the evolution of biometric security by Khalifa, Othman Omran

    Published 2023
    “…Chapter two provides a detailed lens into the core mechanics, followed by an exploration of the algorithms that drive the matching processes in Chapter Three. …”
    Get full text
    Get full text
    Get full text
    Book