Search Results - (( using optimization method algorithm ) OR ( normal distribution based algorithm ))

Refine Results
  1. 1

    Profit-based optimal generation scheduling of a microgrid by Muhamad Razali N.M., Hashim A.H.

    Published 2023
    “…The results demonstrate the efficiency of using genetic algorithm to solve the optimization problem. �2010 IEEE.…”
    Conference paper
  2. 2

    A new variant of black hole algorithm based on multi population and levy flight for clustering problem by Haneen Abdul Wahab, Abdul Raheem

    Published 2020
    “…The obtained results were compared with the BH and previous optimization algorithms for both test functions as well as data clustering in terms of normal and high dimensional datasets. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Nomadic people optimizer (NPO) for large-scale optimization problems by Mohamd Salih, Sinan Qahtan

    Published 2019
    “…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Adaptive Traffic Prioritization Algorithm Over Ad Hoc Network Using IEEE 802.11e by Anuar, Ammar

    Published 2016
    “…The IEEE 802.11e standard aims to provide enhancements that allow traffic with specific requirements to be treated differently from normal traffic. Enhanced Distributed Channel Access (EDCA) is a fundamental and mandatory contention-based channel access method of IEEE 802.11e which delivers traffic based on differentiated Access Category (ACs). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Determining penetration limit of central distributed generation topology in radial distribution networks by Suliman, Mohamed Saad Abdelgadir

    Published 2021
    “…The biogeography based optimization method has been proven to have better performance than artificial bee colony, genetic algorithm, particle swarm optimization, hybrid of particle swarm optimization and constriction factor approach, and hybrid of ant colony optimization and artificial bee colony methods in terms of active power loss reduction. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Heart sound diagnosis using nonlinear ARX model / Noraishah Shamsuddin by Shamsuddin, Noraishah

    Published 2011
    “…The Resilient Backpropagation (RPROP) algorithm is used to train the network. The optimized learning parameter used is 0.07 and the network has best performance when hidden neurons equal to 220. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems by Ariafar, Shahram

    Published 2012
    “…In order to validate the models several cases are generated and demonstrated by two methods, Lingo 12.0 optimization software and an enumeration algorithm which is developed in C/C++. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Automatic database of robust neural network forecasting / Saadi Ahmad Kamaruddin, Nor Azura Md. Ghani and Norazan Mohamed Ramli by Ahmad Kamaruddin, Saadi, Md. Ghani, Nor Azura, Mohamed Ramli, Norazan

    Published 2014
    “…The backpropagation algorithm is one of the most famous algorithms to train neural network based on the mean square error (MSE) of ordinary least squares (OLS). …”
    Get full text
    Get full text
    Get full text
    Book Section
  9. 9

    Optimal performance of stand-alone hybrid microgrid systems based on integrated techno-economic-environmental energy management strategy using the grey wolf optimizer by Tukkee, Ahmed Sahib, Bin Abdul Wahab, Noor Izzri, Binti Mailah, Nashiren Farzilah, Hassan, Mohd Khair

    Published 2024
    “…The proposed strategy reduced the system’s total net present cost, power loss, and emissions by (1.06), (8.69), and (17.19), respectively compared to normal operation. Firefly Algorithm (FA) and Particle Swarm Optimization (PSO) techniques were used to verify the results. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Reservoir Inflow Forecasting Using Artificial Neural Network and Adaptive Neuro-Fuzzy Inference System Techniques by Googhari, Shahram Karimi

    Published 2007
    “…Daily reservoir inflow was computed using a water balance equation. The reservoir inflow and rainfall data sets were examined for normal distribution and the best data transformation was used. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Application of genetic algorithm methods to optimize flowshop sequencing problem by Mohd Fadil, Md Sairi

    Published 2008
    “…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fitted the best 2-parameter CDF compared to WeibuII, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Article
  15. 15

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. This novel algorithm applies coefficients scrambling using Combined-Reverse-and-Normal-Direction (CRND) scanning together with Distorted DC permutation (DDP). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Inversion of 2D and 3D DC resistivity imaging data for high contrast geophysical regions using artificial neural networks / Ahmad Neyamadpour by Neyamadpour, Ahmad

    Published 2010
    “…One common method to obtain the true resistivity distribution is by inverting the apparent resistivity values. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Parallel distributed genetic algorithm development based on microcontrollers framework by Krishnan P.S., Kiong T.S., Koh J.

    Published 2023
    “…This work is focused on the implementation of evolutionary based computer algorithms, genetic algorithms (GAs), on microcontrollers. …”
    Conference paper
  18. 18

    Optimum capacitor placement and sizing for distribution system based on an improved voltage stability index by Aman, M.M., Jasmon, G.B., Bakar, A.H.A., Mokhlis, Hazlie

    Published 2012
    “…An algorithm is also proposed, based on RVSI, for optimum shunt capacitor placement in the distribution system. …”
    Get full text
    Get full text
    Article
  19. 19

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis