Search Results - (( variable loading optimization algorithm ) OR ( java applications security algorithm ))

Refine Results
  1. 1
  2. 2

    Optimization Of Bar Linkage By Using Genetic Algorithms by Ramasamy, Mugilan

    Published 2005
    “…This thesis presents the method of using simple Genetic Algorithms (GAs) in optimizing the size of bar linkage with discrete design variables and continues design variables. …”
    Get full text
    Get full text
    Monograph
  3. 3
  4. 4

    A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models by ul Islam, B., Baharudin, Z.

    Published 2017
    “…The results show that the neural network optimized with genetic algorithm and trained with an optimally and intelligently selected input vector containing historical load and meteorological variables produced the best prediction accuracy. …”
    Get full text
    Get full text
    Article
  5. 5

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    One day ahead daily peak hour load forecasting by using invasive weed optimization learning algorithm based Artificial Neural Network by Rahim, Muhammad Fitri

    Published 2012
    “…In this project, an Artificial Neural Network (ANN) trained by the Invasive Weed Optimization (IWO) learning algorithm is proposed for short term load forecasting (STLF) model. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Sediment load forecasting from a biomimetic optimization perspective: Firefly and Artificial Bee Colony algorithms empowered neural network modeling in �oruh River by Katipo?lu O.M., Kartal V., Pande C.B.

    Published 2025
    “…The service life of downstream dams, river hydraulics, waterworks construction, and reservoir management is significantly affected by the amount of sediment load (SL). This study combined models such as the artificial neural network (ANN) algorithm with the Firefly algorithm (FA) and Artificial Bee Colony (ABC) optimization techniques for the estimation of monthly SL values in the �oruh River in Northeastern Turkey. …”
    Article
  8. 8

    An Application of Cuckoo Search Algorithm for Solving Optimal Chiller Loading Problem for Energy Conservation by M. H., Sulaiman, Muhammad Ikram, Mohd Rashid, Mohd Rusllim, Mohamed, Omar, Aliman, Hamdan, Daniyal

    Published 2014
    “…This paper presents a recent swarm intelligence technique viz. Cuckoo Search Algorithm (CSA) for solving the Optimal Chiller Loading (OCL) problem for energy conservation. …”
    Get full text
    Conference or Workshop Item
  9. 9

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Saraf, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…Alternatively, variable length searching enables searching within the variable length of the solution space, which leads to more optimality and less computational load. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Saraf, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…Alternatively, variable length searching enables searching within the variable length of the solution space, which leads to more optimality and less computational load. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Sara, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…Alternatively, variable length searching enables searching within the variable length of the solution space, which leads to more optimality and less computational load. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An application barnacles mating optimizer for forecasting of full load electrical power output by Zuriani, Mustaffa, Mohd Herwan, Sulaiman, Bariah, Yusob, Ferda, Ernawan

    Published 2020
    “…The inputs are fed into the BMO algorithm which acts as a forecasting model. The performance of BMO is later compared against two comparable meta-heuristic algorithms namely Grey Wolf Optimizer (GWO) and Moth-flame Optimizer (MFO). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Optimal operation and control of hybrid power systems with stochastic renewables and FACTS devices: An intelligent multi-objective optimization approach by Premkumar M., Hashim T.J.T., Ravichandran S., Sin T.C., Chandran R., Alsoud A.R., Jangir P.

    Published 2025
    “…This study prioritizes the examination of both constant and fluctuating load requirements. The inherent variability of PV and wind energy, along with load demand, is captured through the modelling of probability density functions. …”
    Article
  15. 15

    Optimal planning of photovoltaic distributed generation considering uncertainties using monte carlo pdf embedded MVMO-SH by Norhafidzah, Mohd Saad

    Published 2021
    “…The load flow patterns will significantly have affected when uncertain PV generation – load models are considered into the power flow algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A high-performance democratic political algorithm for solving multi-objective optimal power flow problem by Ahmadipour M., Ali Z., Othman M.M., Bo R., Javadi M.S., Ridha H.M., Alrifaey M.

    Published 2025
    “…Simulation results are analyzed and compared with two popular and commonly used multi-objective-evolutionary algorithms namely, non-dominated sorting genetic algorithm II (NSGA-II) and the multi-objective particle swarm optimization (MOPSO) on the problem. …”
    Article
  17. 17

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…In the hybrid scheme, the initial parameters of the modified BP neural network are optimized by using the global search ability of genetic algorithm, improved by cat chaotic mapping to enrich its optimization capability. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    A binary archimedes optimization algorithm and weighted sum method for UFLS in islanded distribution systems considering the stability index and load priority by Mohd Rosli, Hazwani, Mokhlis, Hazlie, Mansor, Nurulafiqah Nadzirah, Md Sapari, Norazliani, Abd Halim, Syahirah, Li, Wang, Sulaima, Mohamad Fani

    Published 2023
    “…This study proposes an under-frequency load-shedding (UFLS) scheme based on a binary Archimedes Optimization Algorithm (BAOA) and the Weighted Sum Method (WSM) to maintain the stability of an islanded distribution system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers