Search Results - adaptive _ differentiated ((generation algorithm) OR (detection algorithm))

Refine Results
  1. 1
  2. 2

    Development of novel distance relay scheme to prevent false tripping during power swing by Mohamad, Nor Zulaily

    Published 2017
    “…The proposed adaptive algorithm has been developed by employing the combination of both detection schemes, as well as based on an adaptive setting of Under Impedance Fault Detector (UIFD) tripping characteristics to dynamically adjust its tripping region during power swing and stop the adjustment if a fault occurs during power swing. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Optimizing S-box generation based on the Adaptive Agent Heroes and Cowards Algorithm by Kamal Z., Zamli

    Published 2021
    “…This paper introduces a new variant of a metaheuristic algorithm based on Agent Heroes and Cowards Algorithm (AHC), called Adaptive Agent Heroes and Cowards Algorithm (AAHC). …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm by Hadi, Mahmaad Khalid

    Published 2016
    “…This SPCS strategy, novel in the generation rescheduling application, is called as Differential Evolution with Adaptive Mutation (DEAM). …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Improved Switching-Basedmedian Filter For Impulse Noise Removal by Teoh, Sin Hoong

    Published 2013
    “…Next, in the noise detection stage, in addition to the originally proposed intensity distance differential approach, the new method includes intensity height differential approach to reduce false detection rate. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Broadening selection competitive constraint handling algorithm for faster convergence by Shaikh, T.A., Hussain, S.S., Tanweer, M.R., Hashmani, M.A.

    Published 2020
    “…In this study, the BSCCH algorithm has been coupled with Differential Evolution algorithm as a proof of concept because it is found to be an efficient algorithm in the literature for constrained optimization problems. …”
    Get full text
    Get full text
    Article
  8. 8

    Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks by Nordin, Noorsalwati

    Published 2007
    “…The metrics employed to measure the performance of the proposed algorithms are average throughput, fairness index, channel utilization and throughput ratio. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    The noise reduction algorithm for star detection by Razaman, Anis Hannani, Ahmad, Yasser Asrul, Gunawan, Teddy Surya, Khalifa, Othman Omran, Saidin, Norazlina

    Published 2025
    “…This paper presents a noise reduction algorithm that enhances the detection of star blobs in noisy star images. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Adaptive step size of diagonally implicit block backward differentiation formulas for solving first and second order stiff ordinary differential equations with applications by Mohd Ijam, Hazizah

    Published 2020
    “…In this thesis, new classes of block methods based on backward differentiation formula (BDF) for solving first and second order stiff ordinary differential equations (ODEs) are developed. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization by Kamal Z., Zamli, Abdul Kader, ., Fakhrud Din, ., Alhadawi, Hussam S.

    Published 2021
    “…To address the nonlinear requirement of cryptography (i.e., ensuring the generated S-box is sufficiently robust against linear and differential cryptanalysis attacks), many chaos-based metaheuristic algorithms have been developed in the literature. …”
    Get full text
    Get full text
    Get full text
    Article