Search Results - (( parameters estimation security algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- parameters estimation »
- estimation security »
- java application »
-
1
ADAPTIVE LINEAR ALGORITHMS FOR POWER SYSTEM FUNDAMENTAL AND HARMONIC ESTIMATION
Published 2015“…Frequency and harmonics are two essential parameters for power system functions such as power quality monitoring, power system protection, economic dispatch and security assessment. …”
Get full text
Get full text
Thesis -
2
Power System State Estimation In Large-Scale Networks
Published 2010“…The developed program is suitable either to estimate the UPFC controller parameters or to estimate these parameter values in order to achieve the given control specifications in addition to the power system state variables.…”
Get full text
Get full text
Thesis -
3
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The research starts with developing the hybrid deep learning model consisting of DNN and a K-Means Clustering Algorithm. Then, the developed algorithm is implemented to estimate the parameters of the Lorenz system. …”
Get full text
Get full text
Thesis -
4
Identifying high influence parameters using Genetic Algorithm (GA) chromosomes for water consumption
Published 2021“…This work utilized Genetic Algorithm (GA) to optimize the coefficient of micro-components of water consumption (CMWC) values to determine high influential household routine parameters. …”
Get full text
Get full text
Get full text
Article -
5
A hybrid algorithm of source localization based on hyperbolic technique in WSN
Published 2014“…In this paper, a hybrid method combined with maximum likelihood (ML) and genetic algorithm (GA) are proposed to determine the instantaneous position of the moving source by estimating the position and velocity based on hyperbolic techniques (TDOA and FDOA). …”
Get full text
Get full text
Conference or Workshop Item -
6
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…We also evaluate the memory cost for system parameters and accumulators. Finally, we study the provable security element for both cryptosystems. …”
Get full text
Get full text
Thesis -
7
Estimation of Examinees' Ability Through Computer Adaptive Testing Based on Neural Network Approach
Published 2010“…In the second phase, estimation of examinees’ ability has been obtained with multi-layer feed forward neural network with back propagation algorithm. …”
Get full text
Get full text
Thesis -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…It can be concluded that the modified algorithm decreases the biases, the variances and the mean squared errors of the LTS estimators. …”
Get full text
Get full text
Thesis -
10
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Effects of Ambient Tropospheric Ozone on Mr-219 Rice in the Muda Irrigation Scheme Area
Published 2005“…This study finding is undeniable imperative and it bestows the first algorithmic yield-loss model of crop to ozone in this country, ever.…”
Get full text
Get full text
Thesis
