Search Results - (( variable generation using algorithm ) OR ( data distribution using algorithm ))

Refine Results
  1. 1

    Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China by Sattar Hanoon M., Najah Ahmed A., Razzaq A., Oudah A.Y., Alkhayyat A., Feng Huang Y., kumar P., El-Shafie A.

    Published 2024
    “…Therefore, this study investigates the capability of various machine learning algorithms in predicting the power production of a reservoir located in China using data from 1979 to 2016. …”
    Article
  2. 2

    Optimal planning of photovoltaic distributed generation considering uncertainties using monte carlo pdf embedded MVMO-SH by Norhafidzah, Mohd Saad

    Published 2021
    “…The urban residential, commercial and industrial load profiles for one reference year are used for the load modelling. The probabilistic values of PV generation and load models are employed as the input data to the load flow analysis for the radial distribution network. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data generated from network traffic are called concept drift. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…It uses the compact and unique variable K length real encoding. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Maintenance dredging: allowable limit for dredge volume differences using SBES and MBES datasets / Raiz Razali by Razali, Raiz

    Published 2017
    “…As different hardware generates different data trends and distributions, different software uses various algorithms to calculate dredge volume and also due to different gridding sizes, it can be expected that the results with varying amounts of dredge volume will be generated. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Maintenance derdging: allowable limit for dredge volume differences using SBES and MBES datasets / Raiz Razali by Razali, Raiz

    Published 2017
    “…As different hardware generates different data trends and distributions, different software uses various algorithms to calculate dredge volume and also due to different gridding sizes, it can be expected that the results with varying amounts of dredge volume will be generated. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Predictive Framework for Imbalance Dataset by Megat Norulazmi, Megat Mohamed Noor

    Published 2012
    “…Real yield data which was obtained from Fuji Electric Malaysia has been used in this research. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A rule-based energy management system for hybrid renewable energy sources with battery bank optimized by genetic algorithm optimization by Jamal S., Pasupuleti J., Ekanayake J.

    Published 2025
    “…In addition to that, a Genetic Algorithm (GA)-based optimization system and Simulated Annealing optimization Algorithm (SAA) were proposed to determine an economical solution for decreasing the cost of the NG system depending on its operational constraints. …”
    Article
  10. 10

    Fault detection and diagnosis using correlation coefficients by Mak, Weng Yee

    Published 2005
    “…Normal Correlation (NC), Principal Component Analysis (PCA) and Partial Correlation Analysis (PCorrA) are used to develop the correlation coefficients between the selected key process variables with the quality variables of interest in the process from the NOC data. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis by Mohamed Elfaki, Faiz Ahmed

    Published 2004
    “…A generated data where the failure times are taken as exponentially distributed are used to further compare these two parametric models. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Climate change impact on hydrological, sediment, and nutrient in Langat River basin: an assessment using integrated model / Nor Faiza Abd Rahman by Abd Rahman, Nor Faiza

    Published 2019
    “…The research suggested that artificial neural network (ANN) using a Lavenberg-Marquardt algorithm can successfully regenerate stream flow and sediment missing data for better accuracy of model. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Combustion modeling of municipal waste combustor by Hussain, Ahmad, Ani, Farid Nasir, Darus, Amer Nordin, Adnan, Mohammed Fadzil, Surjosatyo, Adi, Mustafa, Azeman, Salema, Arshad A.

    Published 2005
    “…However, CFD flow simulations can enable detailed parametric variations of design variables. CFD modeling of an industrial scale MSW incinerator was done using FLUENT. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation by Bahomaid, Ameen A., Alsewari, Abdulrahman A., Zamli, Kamal Z., Alsariera, Yazan A.

    Published 2018
    “…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Value of random number should be greater than 35 bits and plaintext must be at least 7 bits. A padding algorithm was used for small size messages or big random numbers. …”
    Get full text
    Get full text
    Article
  19. 19

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…The lower and upper limit of design variables (0 and 1) were used to find initial material distribution to initialize the firefly algorithm based section of the hybrid algorithm. …”
    Get full text
    Get full text
    Article
  20. 20

    Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing by S. Ahmed, Bestoun

    Published 2011
    “…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
    Get full text
    Get full text
    Thesis