Search Results - (( loading optimisation search algorithm ) OR ( java location based algorithm ))
Search alternatives:
- loading optimisation »
- search »
- java »
-
1
-
2
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…Recently, a nature-inspired metaheuristic known as Symbiotic Organisms Search (SOS) optimisation algorithm was proposed. …”
Get full text
Get full text
Thesis -
3
Novel techniques for voltage stability assessment and improvement in power system / Ismail Musirin.
Published 2004“…A new Evolutionary programming (EP) based acceleration search algorithm was developed to accelerate the process in estimating maximum load ability in a power system. …”
Get full text
Get full text
Thesis -
4
Tap Settings Optimization in Power Systems: Economic Efficiency Enhancement Through Cuckoo Search Algorithm While Ensuring Voltage Stability
Published 2024Subjects: “…cuckoo search algorithm…”
Conference Paper -
5
Variable Neighbourhood Search Algorithm for Vehicle Routing Problem with Backhaul
Published 2023“…Thus, a heuristic approach based on the Variable Neighbourhood Search (VNS) is proposed. In this research, 22 sets of benchmark instances introduced by Goetschalckx and Jacobs-Blecha are used to test the efficiency and effectiveness of the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Cuckoo optimised 2DOF controllers for stabilising the frequency changes in restructured power system with wind-hydro units
Published 2021“…In this work, proportional-integral (PI), proportional-integral derivative (PID), and 2-degree of freedom PID (2-DOF-PID) controllers are proposed to stabilise the variations in the system parameters at distinct loading conditions. Different types of metaheuristic optimisation methods like teaching–learning-based optimisation (TLBO) and cuckoo search algorithms are suggested to acquire the optimal gain values of the proposed controllers. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Unit commitment in power system using multi-agent evolutionary programming incorporating priority listing optimisation technique / Muhammad Nazree Che Othman
Published 2013“…In the proposed technique, deterministic PL technique was first applied to produce a population of initial solutions. The search process then being refined using heuristic EP-based algorithm with multi-agent approach to produce the final solution. …”
Get full text
Get full text
Thesis -
8
-
9
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
10
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
11
Effective method for optimal allocation of distributed generation units in meshed electric power systems
Published 2011“…This effectively overcomes the premature convergence problem of the simple genetic algorithm (SGA). The results obtained on IEEE 6-bus and 30-bus test systems with the proposed method are evaluated with the simulation results of the classical grid search algorithm, which confirm its robustness and accuracy. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
Chaotic mutation immune evolutionary programming for photovoltaic planning in power system / Sharifah Azma Syed Mustaffa
Published 2020“…The element of chaotic local search is also integrated into the algorithm for better performance. …”
Get full text
Get full text
Thesis -
15
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article -
18
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
19
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
Get full text
Get full text
Thesis
