Search Results - (( loading identification using algorithm ) OR ( java application designing algorithm ))

Refine Results
  1. 1

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…Voltage stability problems have been one of the major concerns for electric utilities as a result of a system heavy loading. This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat by Minhat, Abdul Rahman

    Published 2008
    “…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6

    Hybrid intelligent methods for parameter identification and load frequency control in power system by Aqeel Sakhy, Jaber

    Published 2014
    “…Where, in the first part, the coherent identification algorithm for single and multi-area power systems with disturbances is proposed. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    High impedance fault detection and identification based on pattern recognition of phase displacement computation by Ali, Mohd Syukri, Bakar, Ab Halim Abu, Tan, Chia Kwang, Arof, Hamzah, Mokhlis, Hazlie

    Published 2018
    “…Subsequently, an automatic HIF classification algorithm based on predefined indices is proposed to perform event identification and HIF detection. …”
    Get full text
    Get full text
    Article
  9. 9

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  10. 10

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…The correlation analysis is used for the identification and selection of the most influential input variable vector (IVV). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi by Hanapi, Suhadiyana

    Published 2018
    “…Secondly, in this research, an empirical dynamic model of the PEM fuel cell system in vehicles was analyzed and validated using the system identification method……”
    Get full text
    Get full text
    Book Section
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  17. 17

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Inverse parameter identification of elastic and inelastic constitutive material models by Hrairi, Meftah

    Published 2011
    “…Two numerical examples are used to demonstrate the effectiveness of the developed identification technique…”
    Get full text
    Get full text
    Get full text
    Book Chapter
  19. 19

    Application of Genetic Algorithm for the Reduction of Reactive Power Losses in Radial Distribution System by Perumal, Nallagownden, Lo, Thin Thin, Ng, Chin Guan, Mahmud, Che Mat Hadzer

    Published 2006
    “…ERACS is used to perform load flow analysis while MATLAB is used for the identification of capacitor current via GAtool, and algorithm for the calculation of loss savings, its particular capacitor size and location. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…Among the widely used technology in recent years is Radio Frequency Identification (RFID). …”
    Get full text
    Get full text
    Get full text
    Thesis