Search Results - (( java implication based algorithm ) OR ( outsider simulation based algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Process variables are defined as fault if they are deviated outside this region. Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Resource allocation techniques for interference mitigation in macro and femtocell heterogeneous network-based LTE system by Al-omari, Motea Saleh Mohammed

    Published 2017
    “…The first proposed hybrid approach consists of two combined schemes, termed as Resource Allocation based Fractional Frequency Reuse and Graph Connectivity algorithm (RAFFRGC). …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Network analysis in a peer-to-peer energy trading model using blockchain and machine learning by Shukla, S., Hussain, S., Irshad, R.R., Alattab, A.A., Thakur, S., Breslin, J.G., Hassan, M.F., Abimannan, S., Husain, S., Jameel, S.M.

    Published 2024
    “…This will lead to profitable P2P energy trading between different distributed prosumers. By analyzing the simulation results of the proposed model and algorithm by benchmarking with the existing state-of-the-art techniques it's clear that the proposed algorithm shows marked improvement over network latency generated results. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD by HENG KEOW, CHUAH

    Published 2012
    “…Unique features from the I", 4t h ,7th and 8thl evel details are obtained as criteria for developing a Rules-Based Algorithm for classifying disturbances that have occurred. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Medium access control protocol based on time division multiple access scheme for wireless body area network by Mohd Ali, Darmawaty, Wan Hassan, Wan Haszerila, Mohd Sultan, Juwita, Kassim, Murizah

    Published 2024
    “…The proposed protocol is compared to the IEEE 802.15.6 MAC, enhanced packet scheduling algorithm MAC (EPSA-MAC), and concurrent MAC (C-MAC) protocols based on the performance metrics of packet delivery ratio (PDR), network throughput, energy consumption, and average delay. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    WIMAX TESTBED by KOH , MINGHAO

    Published 2008
    “…This Final Year Project attempts to simulate via Simulink, the working mechanism of a WiMAX testbed that includes a transmitter, channel and receiver. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Support vector machine for day ahead electricity price forecasting by Razak I.A.B.W.A., Abidin I.B.Z., Siah Y.K., Rahman T.K.B.A., Lada M.Y., Ramani A.N.B., Nasir M.N.M., Ahmad A.B.

    Published 2023
    “…Many factors cause for price spikes such as volatility in load and fuel price as well as power import to and export from outside the market through long term contract. This paper introduces an approach of machine learning algorithm for day ahead electricity price forecasting with Least Square Support Vector Machine (LS-SVM). …”
    Conference Paper
  11. 11

    Cyber vulnerabilities in smart grid and safety measures for energy meters in advanced metering system and smart meter communications by Ayob A., Salim Reza S.M., Hussain A., Saad M.H.M., Amin N.

    Published 2023
    “…It also uses chaos based key generation as well as public key-based authentication techniques. …”
    Article
  12. 12

    Modified sequential fences for identifying univariate outliers by Wong, Hui Shein

    Published 2016
    “…Furthermore, a new approach is proposed by considering the skewness of underlying distribution to increase efficiency of sequential fences in skewed distribution. Conclusively, based on the numerical examples and simulation study, newly proposed method has been adjusted according to the skewness of the underlying distribution of data. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Industrial datasets with ICS testbed and attack detection using machine learning techniques by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Balla, Asaad, Tahir, Mohammad, Elsheikh, Elfatih A A, Suliman, F M

    Published 2021
    “…An innovative concept of using real operational technology network traffic-based testbed, for cyber-physical system simulation and analysis, is presented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Digital closed loop controller of hydraulic cylinder using linear transducer / Mohd. Aizuddin Khalid by Khalid, Mohd. Aizuddin

    Published 2010
    “…SIMULINK is integrated with MATLAB, providing immediate access to an extensive range of tools that can develop algorithms, analyze and visualize simulations, customize the modeling environment, define signal, parameter, and test data. …”
    Get full text
    Get full text
    Thesis
  16. 16