Search Results - (( java implication based algorithm ) OR ( meeting practical function algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Modified Firefly Algorithm in Solving Economic Dispatch Problems with Practical Constraints by M. H., Sulaiman

    Published 2012
    “…In addition the practical ED problems which are involving objective functions with quality and inequality constraints including the practical operation constraints of generators such as ramp rate limit, prohibited operating zones and generation limits make it harder to find the global optimum results of ED. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    An Application of Differential Search Algorithm in Solving Non-Convex Economic Dispatch Problems with Valve-Point Effects by M. H., Sulaiman

    Published 2013
    “…In addition, the practical ED problems which are involving non-convex objective functions with equality and inequality constraints including the practical operation constraints of generators such as ramp rate limit, prohibited operating zones and generation limits make it harder to solve the global optimum using conventional methods. …”
    Get full text
    Get full text
    Article
  4. 4

    Backtracking search algorithm for optimal power dispatch in power system / Mostafa Modiri Delshad by Mostafa, Modiri Delshad

    Published 2016
    “…Backtracking search algorithm (BSA) as the new evolutionary technique of optimization is used for solving the problems. …”
    Get full text
    Get full text
    Thesis
  5. 5

    The development of semantic meta-database: an ontology based semantic integration of biological databases by Samsudin, Ruhaidah, Deris, Safaai, Othman, Muhammad Razib, Md. Illias, Rosli

    Published 2007
    “…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Efficiency analysis for public key systems based on fractal functions. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan, M. Ahmed, Adil

    Published 2011
    “…Approach: Taking the security threats and privacy issues into consideration, fractals functions were incorporated into public-key cryptosystem due to their complicated mathematical structure and deterministic nature that meet the cryptographic requirements. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    The performance effect due to varying network topologies on a software-defined network employing the k-shortest path by Linsheng, R., Derahman, M. N., Kadir, M. F. A., Mohamed, M. A., Kamarudin, S.

    Published 2022
    “…However, constraints such as the need to bypass the node which has a high rate of failure exist to prevent the Dijkstra algorithm from meeting this demand. In practice, we need not only consider the shortest path but also consider the second short path, the third short path, and so on. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    H-infinity with Pole Placement Constraint in LMI Region for a Buck-converter Driven DC Motor by Mohd Zaidi, Mohd Tumari, Muhammad Salihin, Saealal, Mohd Riduwan, Ghazali, Yasmin, Abdul Wahab

    Published 2012
    “…In addition the practical ED problems which are involving objectives functions with quality and inequality constraints including the practical operations constraints of generators such as ramp rate limit, prohibited operating zones and generation limits make it harder to find the global optimum results of ED. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site by Wanbo, Luo

    Published 2025
    “…Fourth, a refined Efficient Intersection over Union (EIoU) loss function, Prior-EIoU, was proposed to increase the convergence speed of the loss function and improve the recall, thereby reducing the missed detection rate. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Improved Cheating Detection in Examinations using YOLOv8 with Attention Mechanism by YAN, ZUO

    Published 2025
    “…This high accuracy rate meets the practical application requirements for real-time cheating detection in offline exam venues. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Software testing is regarded as an activity to evaluate the functionality and features of a system. It verifies whether the system is meeting the requirement or not. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14
  15. 15

    A novel MPPT approach for photovoltaic system using Pelican optimization and high-gain DC–DC converter by Akter, Khadiza, Motakabber, S. M. A., Alam, A. H. M. Zahirul, Yusoff, Siti Hajar, Pachauri, Rupendra Kumar, Malik, Hasmat, Jadoun, Vinay Kumar

    Published 2025
    “…To overcome these issues, a, practical Maximum Power Point Tracking (MPPT) function is crucial for optimizing power extraction in such dynamic environments. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Power prediction using the wind turbine power curve and data-driven approaches / Ehsan Taslimi Renani by Ehsan Taslimi , Renani

    Published 2018
    “…To obtain the unknown vector of parameters of the MHTan, three heuristic optimization algorithms are employed to minimize the sum of squared residuals. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Statistical modelling of time series of counts for a new class of mixture distributions / Khoo Wooi Chen by Khoo, Wooi Chen

    Published 2016
    “…Integer-valued correlated stochastic processes, which we often meet in the real world, are of major concern in many natural and social sciences. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…Many existing schemes have been proposed trying to meet the security and functionality of the cross-domain systems. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Fuzzy-pid controller design for brake-by-wire system of electrical vehicle by Sider, Ameer M. F.

    Published 2014
    “…In view of that, the mechanism behavior and operating process of both brake systems are dominated by implementing distinct control algorithms based on PID and Fuzzy-PID controllers. …”
    Get full text
    Get full text
    Thesis