Search Results - (( based evaluation force algorithm ) OR ( field communication system algorithm ))

Refine Results
  1. 1

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…Evaluations of algorithms reveal that the proposed algorithm has achieved a level of security and complexity that is 48 times superior to that of other methods that have been tried and tested. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…The performance of Extended Virtual Force-Based Algorithm (EVFA) and Cuckoo Search (CS) algorithm are evaluated and EVFA shows the improvement of coverage area and exhibits a guaranteed connectivity compared to CS algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa by Esa, Abdul Halim

    Published 2016
    “…The characteristics of the tactile sensor will be analysed according to three parameters namely area, perimeter and diameter of the tactile sensor. Based on these three parameters, three different types of algorithm are developed in order to measure experimentally the forces and deformation based on optical information of the tactile sensor. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff by Fatin Nabila , Abd Latiff

    Published 2021
    “…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R.

    Published 2023
    “…The system can cipher the data using PRINCE algorithm on a VIRTEX-403 FPGA evaluation board and using GSM modems to communicate over a cellular network. …”
    Article
  7. 7

    Securing electrical substation's wireless messaging with a lightweight crypto-algorithm IP core by Abbas Y.A., Jidin R., Jami N., Z'aba M.R.

    Published 2023
    “…The crypto-algorithm has been implemented within an environment of microprocessor system on a XILINX Field Programmable Logic Arrays chip. …”
    Conference Paper
  8. 8

    Regenerative braking strategy for electric vehicles using improved adaptive genetic algorithm by Taleghani, Hussein

    Published 2017
    “…The second strategy is based on Standard Genetic Algorithm (SGA). Lastly, the third strategy is utilizing Improved Adaptive Genetic Algorithm (IAGA). …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…This is then followed by a discussion on the newly proposed algorithm that is based on a multi size grid and its evaluation by an attacker team. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Improving regenerative braking strategy using genetic algorithm for electric vehicles / H. Taleghani ... [et al.] by Taleghani, H., Hassan, M.K, Abdul Rahman, R. Z., Che Soh, A.

    Published 2018
    “…The performance of the proposed regenerative braking control algorithm is evaluated by the ADVISOR which is based on MATLAB/Simulink environment. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…The proposed method was validated by comparing the output force of PSCA with the experimental target force from load cell (reference). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Adaptive Noise Cancellation Systems using Selectable Algorithm by Roshahliza, M. Ramli, Salina, Abdul Samad

    Published 2016
    “…The book targets DSP designers, researchers and postgraduate students in the field of DSP for mobile communication systems. The book provides analysis of the results obtained from subjecting the developed system to environmental noise.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  16. 16

    An improved public key cryptography based on the elliptic curve by Al-Daoud, Essam Faleh

    Published 2002
    “…Meanwhile, the size of the public keys are reduced by 37 to 48 percent. The improved algorithms are applied to the on-line and off-line electronic payments systems, which lead to probably the best solution to reduce the objects size and enhance the performance in both systems.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Field theory analysis for wireless infrared system's error correction by Jatoi, M.A., Kamel, N., Ousta, F., Gardezi, S.J.S.

    Published 2014
    “…This paper provides a brief account on field theory used for error correction in wireless infrared systems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Such approach is highly dependable on the clustering algorithm parameterization, and is not capable to deal with the normal system’s specification changes. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20