Search Results - (( using function based algorithm ) OR ( loading identification system algorithm ))

Refine Results
  1. 1

    Development of multi-objective load shedding optimization via back tracking search algorithm with novel reactive power tracing index by Verayiah R., Mohamed A., Shareef H., Abidin I.H.Z.

    Published 2023
    “…Electric power plant loads; Learning algorithms; MATLAB; Multiobjective optimization; Optimization; Reactive power; Back tracking; Backtracking search algorithms; Identification method; Load-shedding; Multi-objective functions; Power flow simulation; System contingencies; Under voltage load shedding; Electric load shedding…”
    Conference Paper
  2. 2

    Bio-signal identification using simple growing RBF-network (OLACA) by Asirvadam , Vijanth Sagayan, McLoone, Sean, Palaniappan, R

    Published 2007
    “…An enhanced online adaptive centre allocation algorithms (or resource allocation network (RAN)) using simple/stochastic back-propagation method with minimal weight update variant are developed for direct-link radial basis function (DRBF) networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…It is an advanced Auto-ID wireless network based configuration system used for identification and tracking of items movement data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz by Ab. Aziz, Nur Fadilah

    Published 2014
    “…Thirdly, new techniques for load margin improvement were developed. Initially, a superior performance of AIS named as Fast Artificial Immune System (FAIS) to estimate the maximum load margin of a system was developed. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…However, if attack or intrusion is detected in less than 30 minutes, ARSA will automatically change the security algorithm to a new one. The evaluation of the MPM performance is measured with HP LoadRunner testing tools from which it is found that the response time of MPM with multithreading is better compared to the single thread model and credit card authorisation system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Fault classification in smart distribution network using support vector machine by Chuan O.W., Ab Aziz N.F., Yasin Z.M., Salim N.A., Wahab N.A.

    Published 2023
    “…Gaussian radial basis function (RBF) kernel function has been used for training of SVM to accomplish the most optimized classifier. …”
    Article
  8. 8
  9. 9

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…Voltage stability problems have been one of the major concerns for electric utilities as a result of a system heavy loading. This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Hybrid intelligent methods for parameter identification and load frequency control in power system by Aqeel Sakhy, Jaber

    Published 2014
    “…Where, in the first part, the coherent identification algorithm for single and multi-area power systems with disturbances is proposed. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Pid-aco vibration controller with magnetorheological damper for wind turbine tower / Mahmudur Rahman by Mahmudur , Rahman

    Published 2019
    “…At first, appropriate dynamic model is estimated using finite difference method (FDM) and system identification process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi by Hanapi, Suhadiyana

    Published 2018
    “…Secondly, in this research, an empirical dynamic model of the PEM fuel cell system in vehicles was analyzed and validated using the system identification method……”
    Get full text
    Get full text
    Book Section
  14. 14

    Embedded Meta evolutionary-firefly algorithm-ANN for multi dg planning in distribution system / Siti Rafidah Abdul Rahim by Abdul Rahim, Siti Rafidah

    Published 2019
    “…The voltage dependent load has a main impact on distribution system planning studies. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Application of Genetic Algorithm for the Reduction of Reactive Power Losses in Radial Distribution System by Perumal, Nallagownden, Lo, Thin Thin, Ng, Chin Guan, Mahmud, Che Mat Hadzer

    Published 2006
    “…ERACS is used to perform load flow analysis while MATLAB is used for the identification of capacitor current via GAtool, and algorithm for the calculation of loss savings, its particular capacitor size and location. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…Precise short term load forecast (STLF) is vitally important for the secure and reliable operation of power systems. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The BOGS-BAT algorithm is based on three techniques. The first technique is to move or switch solution from single function to functions that contain more than one objective functions. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis