Search Results - data distribution ((((function algorithm) OR (detection algorithm))) OR (control algorithm))
Search alternatives:
-
1
Customized fault management system for low distribution automation system
Published 2008“…Supervisory Control and Data Acquisition (SCADA) is integrated with RTU for automatic operating and controlling the distribution system. …”
Get full text
Get full text
Proceeding Paper -
2
Power line carrier (PLC) based communication system for distribution automation system
Published 2008“…Supervisory Control and Data Acquisition (SCADA) is integrated with RTU for automatic operating and controlling the distribution system. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
Published 2021“…GEADDDC generalizes the Renyi Joint Entropy algorithm and uses a dynamic threshold to detect DDoS attacks on the SDN controller.…”
Get full text
Get full text
Thesis -
4
Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis
Published 2004“…The study also carries out an investigation of the causes of failure for statistical process control. The x chart, R chart and Cp, and Cpk are examined for the possibility of being used to detect the state of control of the covariates in the two competing risks models (Cox’s with Weibull distribution (PHW2) and modification of weighted score function (MW)). …”
Get full text
Get full text
Thesis -
5
Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication
Published 2013“…The RTU provides monitoring fault operation, controlling functions and data collection for analysis. …”
Get full text
Get full text
Conference or Workshop Item -
6
Levy Flight Safe Experimentation Dynamics Algorithm for Data-Based PID Tuning of Flexible Joint Robot
Published 2020“…This paper proposes the data-based PID controller of flexible joint robot based on Levy Flight Safe Experimentation Dynamics (LFSED) algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…A data parallel algorithm (DPA-EHD) is designed and implemented for the EHD equations. …”
Get full text
Get full text
Thesis -
9
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
10
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…All the data for 18-bus system test are taken from previous work, and all the data for 49-bus system test are taken from an existing Iraqi distribution network. …”
Get full text
Get full text
Thesis -
11
An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan
Published 2018“…Identifying the abnormally high-risk regions in a spatiotemporal space that contains an unexpected disease count is helpful to conduct surveillance and implement control strategies. The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
Get full text
Get full text
Article -
12
An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan
Published 2018“…Identifying the abnormally high-risk regions in a spatiotemporal space that contains an unexpected disease count is helpful to conduct surveillance and implement control strategies. The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
Get full text
Get full text
Article -
13
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…Firstly, data collected from available sources as Supervisory Control and Data Acquisition (SCADA). …”
Get full text
Get full text
Thesis -
14
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…To preserve the correct functioning of the entire SDN architecture, an efficient detection of various distributed coordinated attacks and anomalies triggered by large-scale malicious events that predominantly target the control plane is of paramount concern and an increasingly important research topic. …”
Get full text
Get full text
Thesis -
15
An Optimized Binary Scheduling Controller for Microgrid Energy Management Considering Real Load Conditions
Published 2024“…This study presents an optimal schedule controller for microgrid energy management, utilizing the Binary Particle Swarm algorithm (BPSO) to minimize costs and ensure optimal power delivery to loads. …”
Conference Paper -
16
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
Get full text
Get full text
Article -
17
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
Get full text
Get full text
Get full text
Thesis
