Search Results - (( var optimization method algorithm ) OR ( pattern detection method algorithm ))

Refine Results
  1. 1

    Determining optimal location of static VAR compensator by means of genetic algorithm by Karami, Mahdi, Mariun, Norman, Ab Kadir, Mohd Zainal Abidin

    Published 2011
    “…The purpose of this paper is to study a practical and accurate heuristic method known as genetic algorithm (GA) which is used to find the optimal location of Static Var Compensator (SVC) and its appropriate size and setting. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Optimal design of three-phase static var compensation system by George M., Bakar M.B.B.A., Basu K.P.

    Published 2023
    “…This manuscript is aimed to emphasize the application of synchronous detection method (SDM) to develop and design three-phase static var compensation (SVC) systems with minimal complexity. …”
    Conference paper
  3. 3

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Sensitivity-based fuzzy multi-objective portfolio model with Value-at-Risk by Zhang, H., Watada, J., Wang, B.

    Published 2019
    “…In addition, compared with the VaR-FMOPSM model, our sensitivity-based improved model with the IPSO algorithm also performs better than Genetic Algorithm and Simulate Anneal Algorithm (SA), it provides the same performance on this point. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement by Karami, Mahdi

    Published 2011
    “…This thesis present a genetic algorithm based method for placement of FACTS devices for voltage profile improvement. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Optimization of support vector machine parameters in modeling of Iju deposit mineralization and alteration zones using particle swarm optimization algorithm and grid search method by Abbaszadeh M., Soltani-Mohammadi S., Ahmed A.N.

    Published 2023
    “…Copper deposits; Deposits; Geology; Learning algorithms; Mineralogy; Static Var compensators; Support vector machines; Three dimensional computer graphics; Alteration zones; Grid search; Grid-search method; Mineralization zone; Model Selection; Particle swarm optimization algorithm; Penalty parameters; Performance; Support vector classifiers; Support vectors machine; Particle swarm optimization (PSO); accuracy assessment; algorithm; classification; computer simulation; copper; geological survey; mineral alteration; mineralization; numerical model; ore deposit; parameterization; performance assessment; porphyry; resource assessment; support vector machine; three-dimensional modeling; Iran…”
    Article
  10. 10

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  11. 11

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Classification and detection of intelligent house resident activities using multiagent by ,, Mohd. Marufuzzaman, M. B. I., Raez, M. A. M., Ali, Rahman, Labonnah F.

    Published 2013
    “…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Loss minimization with SVC installation using the Firefly Algorithm method / Syazana Abdul Halim by Abdul Halim, Syazana

    Published 2012
    “…This algorithm method is idealized by some of the characteristics of fireflies. …”
    Get full text
    Get full text
    Thesis
  15. 15

    On the Application of heuristic Method and Saddle Node Bifurcation for Optimal Placement of FACTS Devices in Power System by Mariun, Norman, Ab Kadir, Mohd Zainal Abidin, Karami, Mehdi

    Published 2011
    “…This study focuses on an optimal placement of five major types of FACTS devices, namely, Static Var Compensator (SVC), Thyristor Controlled Series Compensator (TCSC), Static Synchronous Compensator (STATCOM), Static Synchronous Series Compensator (SSSC) and Unified Power Flow Controller (UPFC) in power system network using a well-known and applicable heuristic method known as genetic algorithm to seek the optimum location and setting of these controllers in the system. …”
    Get full text
    Get full text
    Article
  16. 16

    An Empirical Study on the Construction of A Non-Convex Risk Parity Portfolio using a Genetic Algorithm by Kusumawati, Rosita, Rosadi, Dedi, Abdurakhman, Abdurakhman

    Published 2025
    “…While conventional numerical methods can be applied, they often struggle with inefficiency and fail to deliver optimal results. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The first stage is to apply reverse engineering method to obtain the specific patterns of individual jammers. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection by Abd Halim, Zakiah, Jamaludin, Nordin, Junaidi, Syarif, Syed Yusainee, Syed Yahya

    Published 2015
    “…The pattern recognition results showed that the AR algorithm is more effective in defect identification. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Swarm negative selection algorithm for electroencephalogram signals classification by Sahel Ba-Karait, Nasser Omer, Shamsuddin, Siti Mariyam, Sudirman, Rubita

    Published 2009
    “…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
    Get full text
    Article