Search Results - (( loading optimization learning algorithm ) OR ( java applications security algorithm ))

Refine Results
  1. 1

    One day ahead daily peak hour load forecasting by using invasive weed optimization learning algorithm based Artificial Neural Network by Rahim, Muhammad Fitri

    Published 2012
    “…In this project, an Artificial Neural Network (ANN) trained by the Invasive Weed Optimization (IWO) learning algorithm is proposed for short term load forecasting (STLF) model. …”
    Get full text
    Get full text
    Student Project
  2. 2
  3. 3

    An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM) by Shamim, Akhtar

    Published 2024
    “…Therefore, in this study a new optimized variant of machine learning algorithms is presented. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Optimization of neural network architecture using genetic algorithm for load forecasting by Islam, B.U., Baharudin, Z., Raza, M.Q., Nallagownden, P.

    Published 2014
    “…The proposed technique provides a pathway to determine the best ANN architecture, prior to the training and learning process of neural network. Multi-objective algorithm is proposed in this research which optimizes the ANN architecture that leads to enhancement in load forecast accuracy and reduction in the computational cost. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Long Term Load Forecasting using Grey Wolf Optimizer - Artificial Neural Network by Yasin Z.M., Salim N.A., Ab Aziz N.F.

    Published 2023
    “…Electric power plant loads; Heuristic methods; Learning algorithms; Neural networks; Particle swarm optimization (PSO); Wind; Accurate prediction; Electrical load; Learning rates; Load forecasting; Long-term load forecasting; Mean absolute percentage error; Meta-heuristic techniques; Optimizers; Forecasting…”
    Conference Paper
  9. 9

    Development of multi-objective load shedding optimization via back tracking search algorithm with novel reactive power tracing index by Verayiah R., Mohamed A., Shareef H., Abidin I.H.Z.

    Published 2023
    “…Electric power plant loads; Learning algorithms; MATLAB; Multiobjective optimization; Optimization; Reactive power; Back tracking; Backtracking search algorithms; Identification method; Load-shedding; Multi-objective functions; Power flow simulation; System contingencies; Under voltage load shedding; Electric load shedding…”
    Conference Paper
  10. 10

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…In the hybrid scheme, the initial parameters of the modified BP neural network are optimized by using the global search ability of genetic algorithm, improved by cat chaotic mapping to enrich its optimization capability. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Optimization of balanced academic curriculum problem in educational institutions using teaching learning based optimization algorithm by Mohd Fadzil Faisae, Ab Rashid, Wasif, Ullah

    Published 2025
    “…This study aims to optimize BACP using the Teaching-Learning Based Optimization (TLBO) algorithm, addressing the limitations of existing approaches and providing an efficient framework for curriculum balancing. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Chiller energy prediction in commercial building : A metaheuristic-enhanced deep learning approach by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2024
    “…Drawing on a diverse dataset from a commercial building, encompassing vital input parameters such as Chilled Water Rate, Building Load, Cooling Water Temperature, Humidity, and Dew Point, the study conducts a comprehensive comparison of metaheuristic algorithms (Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Barnacles Mating Optimizer (BMO), Harmony Search Algorithm (HSA), Differential Evolution (DE), Ant Colony Optimization (ACO), and the latest RIME algorithm). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis