Search Results - (( data simulation based algorithm ) OR ( based verification using algorithm ))
Search alternatives:
- based verification »
- verification using »
- simulation based »
- data simulation »
- using algorithm »
-
1
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
2
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
3
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
Get full text
Get full text
Thesis -
4
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
5
Modeling And Control Of V-Groove Rotary Impact Driver
Published 2020“…The speed is optimized by using state-flow algorithm with fixed-point data types, thus reduced hardware computational requirement with acceptable accuracy. …”
Get full text
Get full text
Thesis -
6
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
Get full text
Get full text
Thesis -
7
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
Get full text
Get full text
Get full text
Article -
8
Fuzzy logic based mppt control for a thermoelectric generator system
Published 2022“…In addition, a boost converter having a Fuzzy Logic Controller (FLC) based MPPT algorithm was added to the TEG modeling. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…The verification and simulation report illustrate that the module and improved algorithm has successfully been executed to deliver a report of tracking that is in accordance with the requirements of administering Halal goods. …”
Get full text
Get full text
Thesis -
10
Design and analysis of DNA sequence alignment module using Smith-Waterman scoring patterns / Wan Abdul Qayyum Moh Salleh
Published 2013“…The system optimizes the aligning DNA fragment using Smith-Waterman algorithm with a pattern recognition algorithm. …”
Get full text
Get full text
Student Project -
11
Design and analysis of DNA sequence alignment module using Smith-Waterman scoring pattern: article / Wan Abdul Qayyum Moh Salleh and A.K. Halim
Published 2013“…The system optimizes the aligning DNA fragment using Smith-Waterman algorithm with a pattern recognition algorithm. …”
Get full text
Get full text
Article -
12
Optimization of solenoid driver and controller for gaseous fuel high-pressure direct injector using model-based approach
Published 2022“…Data-driven modelling using a one-stage plan and an Interpolating Radial Basis Function (RBF) model was generated based on data collected from the injector simulation. …”
Get full text
Get full text
Thesis -
13
Frit-based controller tuning of a dc-dc boost converter
Published 2022“…Furthermore, we formulate the algorithm for determining the optimal controller parameters based on the Model-Free approach. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Dynamic modelling of a single link flexible manipulator in vertical motion using swarm and genetic optimisation
Published 2009“…Investigations focus on characterizing the system from input torque to hub-angle, hub-velocity and end-point acceleration. A simulation environment characterizing the system behaviour in vertical motion is used as a platfonn to test and verifY the PSO and GA based transfer function models. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
Published 2017“…It employs multi-level detection based on identity and position verification. Then, a trust algorithm is applied based on the energy of each sensor node. …”
Get full text
Get full text
Get full text
Article -
16
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…Likewise, the widely used standard verification simulation tool AVISPA is used to verify that the scheme is secure against passive and active attacks. …”
Get full text
Get full text
Thesis -
17
User authentication using neural network in smart home
Published 2009“…Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Fuzzy-Pid Based Controler For Active Vibration Control Of Nonlinear Dynamic Systems
Published 2019“…Initially, the experimental rig was designed and integrated with the instrumentation system for vibration data collection purpose. The vibration data obtained experimentally was used to model the dynamic system based on auto-regressive with exogenous input structure using evolutionary swarm algorithm. …”
Get full text
Get full text
Get full text
Proceeding -
19
A fictitious reference iterative tuning method for buck converter-powered DC motor control system
Published 2019“…This paper presents a model-free optimization algorithm for a PID controller based on Fictitious Reference Iterative Tuning and Simulated Kalman Filter. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Application of Neural Network in User Authentication for Smart Home System
Published 2009“…As a result, a password-based user authentication system for smart home by using neural network had been developed successfully.…”
Get full text
Get full text
Get full text
Article
