Search Results - (( based evaluation mechanism algorithm ) OR ( based verification based algorithm ))
Search alternatives:
- evaluation mechanism »
- mechanism algorithm »
- based verification »
- verification based »
- based evaluation »
-
1
Development Of Analytical Solution For Thermo-Mechanical Stresses Of Multilayered Pressure Vessel Based On Recursive Algorithm
Published 2022“…Recent studies showed that analytical solution based on recursive algorithm can be used to obtain thermo-mechanical stresses of multilayered structure efficiently. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing
Published 2025“…This review also examines key performance metrics such as accuracy, precision, recall, and processing time to evaluate the efficiency of various ML algorithms for real-time fraud detection. …”
Get full text
Get full text
Get full text
Article -
3
Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism
Published 2008“…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
Get full text
Get full text
Thesis -
4
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…Later, the dynamic configuration algorithm was designed to utilize possible support assignments based on support provision requirements. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Modeling And Control Of V-Groove Rotary Impact Driver
Published 2020“…A state-flow control algorithm is developed on the model to improve the mentioned shortfalls. …”
Get full text
Get full text
Thesis -
6
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
Get full text
Get full text
Thesis -
7
-
8
Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
Published 2011“…As a starting point, the CGA generation and verification algorithms are implemented with the help of a cryptographic library designed especially for embedded systems. …”
Get full text
Get full text
Get full text
Article -
9
Dynamic modelling and control of a flexible manipulator
Published 2003“…The performance and accuracy of the simulation algorithm are studied in comparison to the experimental results in both domains. …”
Get full text
Get full text
Get full text
Thesis -
10
Scanning laser thermographic system for non-destructive evaluation of incipient thermal damages in aircraft composite panel
Published 2018“…Third, to validate the effectiveness of the system and algorithm for non-destructive evaluation of ITD in glass fiber reinforced composite plate (GFRP). …”
Get full text
Get full text
Get full text
Thesis -
11
Modelling and calibration of high-pressure direct injection compressed natural gas engine
Published 2021“…An optimal Artificial Neural Network (ANN) model is required to facilitate model-based calibration (MBC) procedure. A proper setting for the MBC procedure using the Genetic Algorithm (GA) needs to be identified. …”
Get full text
Get full text
Thesis -
12
Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption
Published 2013“…FE model was developed and validated based on Z. Ahmad FE model. Based on the verification process, deformation mode and energy absorption predicted by the developed FE model agree with the validated FE model. …”
Get full text
Get full text
Conference or Workshop Item -
13
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
14
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
15
Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad
Published 2019“…The system model of the proposed solution is also developed and evaluated at macro level through formal verification. …”
Get full text
Get full text
Get full text
Thesis -
16
Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification
Published 2005“…The Proposed Cp Estimation Algorithm Is Based On The Alteration Tracking (At) Followed By An Estimation Algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
18
Development of a novel natural frequencies prediction tool for laminated composite plates using integrated artificial neural network (ANN) - simulink MATLAB / Mohd Arif Mat Norman
Published 2024“…The prediction tool utilises an Artificial Neural Network (ANN) with a two-layer feed-forward algorithm and ten hidden layers, using Levenberg-Marquardt as the training algorithm. …”
Get full text
Get full text
Thesis -
19
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The classification and verification algorithm was based on face shape elliptical ratio and facial features angle distribution. …”
Get full text
Get full text
Get full text
Article -
20
