Search Results - (( loading identification system algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- loading identification »
- identification system »
- application mining »
- system algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…This algorithm is used to estimate the maximum loadability point in power system. …”
Get full text
Get full text
Thesis -
4
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…Voltage stability problems have been one of the major concerns for electric utilities as a result of a system heavy loading. This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
5
Development of multi-objective load shedding optimization via back tracking search algorithm with novel reactive power tracing index
Published 2023“…Electric power plant loads; Learning algorithms; MATLAB; Multiobjective optimization; Optimization; Reactive power; Back tracking; Backtracking search algorithms; Identification method; Load-shedding; Multi-objective functions; Power flow simulation; System contingencies; Under voltage load shedding; Electric load shedding…”
Conference Paper -
6
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
7
Hybrid intelligent methods for parameter identification and load frequency control in power system
Published 2014“…Where, in the first part, the coherent identification algorithm for single and multi-area power systems with disturbances is proposed. …”
Get full text
Get full text
Thesis -
8
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi
Published 2018“…Secondly, in this research, an empirical dynamic model of the PEM fuel cell system in vehicles was analyzed and validated using the system identification method……”
Get full text
Get full text
Book Section -
11
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
12
Embedded Meta evolutionary-firefly algorithm-ANN for multi dg planning in distribution system / Siti Rafidah Abdul Rahim
Published 2019“…The voltage dependent load has a main impact on distribution system planning studies. …”
Get full text
Get full text
Thesis -
13
Application of Genetic Algorithm for the Reduction of Reactive Power Losses in Radial Distribution System
Published 2006“…ERACS is used to perform load flow analysis while MATLAB is used for the identification of capacitor current via GAtool, and algorithm for the calculation of loss savings, its particular capacitor size and location. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…Among the widely used technology in recent years is Radio Frequency Identification (RFID). It is an advanced Auto-ID wireless network based configuration system used for identification and tracking of items movement data. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz
Published 2014“…Thirdly, new techniques for load margin improvement were developed. Initially, a superior performance of AIS named as Fast Artificial Immune System (FAIS) to estimate the maximum load margin of a system was developed. …”
Get full text
Get full text
Thesis -
18
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…Precise short term load forecast (STLF) is vitally important for the secure and reliable operation of power systems. …”
Get full text
Get full text
Thesis -
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
20
Computationally efficient sequential learning algorithms for direct link resource-allocating networks
Published 2005“…The new algorithms, which also incorporate a pruning strategy to control network growth, are evaluated on three different system identification benchmark problems and shown to outperform existing methods both in terms of training error convergence and computational efficiency.…”
Get full text
Get full text
Article
