Search Results - (( java application during algorithm ) OR ( loading identification learning algorithm ))

Refine Results
  1. 1

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…Voltage stability problems have been one of the major concerns for electric utilities as a result of a system heavy loading. This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of multi-objective load shedding optimization via back tracking search algorithm with novel reactive power tracing index by Verayiah R., Mohamed A., Shareef H., Abidin I.H.Z.

    Published 2023
    “…Electric power plant loads; Learning algorithms; MATLAB; Multiobjective optimization; Optimization; Reactive power; Back tracking; Backtracking search algorithms; Identification method; Load-shedding; Multi-objective functions; Power flow simulation; System contingencies; Under voltage load shedding; Electric load shedding…”
    Conference Paper
  3. 3

    Computationally efficient sequential learning algorithms for direct link resource-allocating networks by Asirvadam , Vijanth Sagayan, McLoone, Sean, Irwin, George W

    Published 2005
    “…Computationally efficient sequential learning algorithms are developed for direct-link resource-allocating networks (DRANs). …”
    Get full text
    Get full text
    Article
  4. 4

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…In this research work, a modified backpropagation neural network is combined with a modified chaos-search genetic algorithm for STLF of one day and a week ahead. Multiple modifications are carried out on the conventional back-propagation (BP) algorithm such as, improvements in the momentum factor and adaptive learning rate. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…It was also concluded that the ICA could successfully improve the learning process of the neural network. Therefore, the obtained results through the proposed DM procedure using ANN-ICA (1) confirmed the robustness of the hybrid network in compare to the pre-developed network, and (2) indicated that, the proposed damage identification model can be considered as a precise approach for monitoring the structural condition subjected to vibrational loads. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Fault classification in smart distribution network using support vector machine by Chuan O.W., Ab Aziz N.F., Yasin Z.M., Salim N.A., Wahab N.A.

    Published 2023
    “…Machine learning application have been widely used in various sector as part of reducing work load and creating an automated decision making tool. …”
    Article
  10. 10

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz by Ab. Aziz, Nur Fadilah

    Published 2014
    “…VSCI was used as the indicator for the MLP of load buses. Another new hybrid algorithm that used Evolutionary Programming (EP) termed as Evolutionary Support Vector Machine (ESVM) was also developed for comparative study. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Design and implementation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayawi by Hayawi, Mustafa Jabbar

    Published 2015
    “…An electronic board, transistor relay driver circuit, is designed for the purpose of establishing communication interface between the computer, adaptive learning algorithm and the actuator mechanism. Design and development an adaptive learning algorithm controller ALAC of position the actuators is presented in real time parallel manipulator based on artificial neural network ANN. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Machine Learning-Enabled Communication Approach for the Internet of Medical Things by Rahim Khan, Abdullah Ghani, Samia Allaoua Chelloug, Mohammed Amin, Aamir Saeed, Jason Teo

    Published 2023
    “…In this paper, a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames, especially with the minimum possible communication overheads in the IoMT network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    PID controller for idle speed control by Tuan Kamaruddin, Tengku Nordayana Akma, Mat Darus, Intan Zaurah

    Published 2013
    “…There are three methods of PID tuning applied: heuristic tuning, self-tuning by pole placement, and also iterative learning algorithm (ILA). Prior to that, data collection is gained from four cylinder sparkignition engine modeling and used as the input-output data in the system identification part. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17
  18. 18

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis