Search Results - (( based evaluation force algorithm ) OR ( field communication system algorithm ))
Search alternatives:
- field communication »
- based evaluation »
- evaluation force »
- system algorithm »
- force algorithm »
-
1
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…Evaluations of algorithms reveal that the proposed algorithm has achieved a level of security and complexity that is 48 times superior to that of other methods that have been tried and tested. …”
Get full text
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014Get full text
Get full text
Undergraduates Project Papers -
3
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…The performance of Extended Virtual Force-Based Algorithm (EVFA) and Cuckoo Search (CS) algorithm are evaluated and EVFA shows the improvement of coverage area and exhibits a guaranteed connectivity compared to CS algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa
Published 2016“…The characteristics of the tactile sensor will be analysed according to three parameters namely area, perimeter and diameter of the tactile sensor. Based on these three parameters, three different types of algorithm are developed in order to measure experimentally the forces and deformation based on optical information of the tactile sensor. …”
Get full text
Get full text
Thesis -
5
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
Get full text
Get full text
Get full text
Thesis -
6
Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA
Published 2023“…The system can cipher the data using PRINCE algorithm on a VIRTEX-403 FPGA evaluation board and using GSM modems to communicate over a cellular network. …”
Article -
7
Securing electrical substation's wireless messaging with a lightweight crypto-algorithm IP core
Published 2023“…The crypto-algorithm has been implemented within an environment of microprocessor system on a XILINX Field Programmable Logic Arrays chip. …”
Conference Paper -
8
Regenerative braking strategy for electric vehicles using improved adaptive genetic algorithm
Published 2017“…The second strategy is based on Standard Genetic Algorithm (SGA). Lastly, the third strategy is utilizing Improved Adaptive Genetic Algorithm (IAGA). …”
Get full text
Get full text
Thesis -
9
-
10
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…This is then followed by a discussion on the newly proposed algorithm that is based on a multi size grid and its evaluation by an attacker team. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Improving regenerative braking strategy using genetic algorithm for electric vehicles / H. Taleghani ... [et al.]
Published 2018“…The performance of the proposed regenerative braking control algorithm is evaluated by the ADVISOR which is based on MATLAB/Simulink environment. …”
Get full text
Get full text
Article -
13
Butterfly Triple System Algorithm Based on Graph Theory
Published 2022Get full text
Get full text
Get full text
Article -
14
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The proposed method was validated by comparing the output force of PSCA with the experimental target force from load cell (reference). …”
Get full text
Get full text
Thesis -
15
Adaptive Noise Cancellation Systems using Selectable Algorithm
Published 2016“…The book targets DSP designers, researchers and postgraduate students in the field of DSP for mobile communication systems. The book provides analysis of the results obtained from subjecting the developed system to environmental noise.…”
Get full text
Get full text
Get full text
Get full text
Book -
16
An improved public key cryptography based on the elliptic curve
Published 2002“…Meanwhile, the size of the public keys are reduced by 37 to 48 percent. The improved algorithms are applied to the on-line and off-line electronic payments systems, which lead to probably the best solution to reduce the objects size and enhance the performance in both systems.…”
Get full text
Get full text
Thesis -
17
Field theory analysis for wireless infrared system's error correction
Published 2014“…This paper provides a brief account on field theory used for error correction in wireless infrared systems. …”
Get full text
Get full text
Conference or Workshop Item -
18
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Such approach is highly dependable on the clustering algorithm parameterization, and is not capable to deal with the normal system’s specification changes. …”
Get full text
Get full text
Thesis -
19
-
20
Obstacle Avoidance by Steering and Braking with Minimum Total Vehicle Force
Published 2016Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
