Search Results - (( data simulation based algorithm ) OR ( data verification using algorithm ))
Search alternatives:
- verification using »
- data verification »
- simulation based »
- data simulation »
- using algorithm »
-
1
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
2
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
3
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
4
Modeling And Control Of V-Groove Rotary Impact Driver
Published 2020“…The speed is optimized by using state-flow algorithm with fixed-point data types, thus reduced hardware computational requirement with acceptable accuracy. …”
Get full text
Get full text
Thesis -
5
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
Get full text
Get full text
Thesis -
6
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
Get full text
Get full text
Thesis -
7
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…CloudSim is used to simulate and assess.…”
Get full text
Get full text
Get full text
Article -
8
Frit-based controller tuning of a dc-dc boost converter
Published 2022“…This report presents a Fictitious Reference Iterative Tuning design for a DC-DC boost converter based on a Model-Free approach. A Fictitious Reference Iterative Tuning is a data-driven controller tuning technique that uses one-shot experimental data to construct the input controller of an undefined plant model. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Optimization of solenoid driver and controller for gaseous fuel high-pressure direct injector using model-based approach
Published 2022“…Data-driven modelling using a one-stage plan and an Interpolating Radial Basis Function (RBF) model was generated based on data collected from the injector simulation. …”
Get full text
Get full text
Thesis -
10
Design and analysis of DNA sequence alignment module using Smith-Waterman scoring patterns / Wan Abdul Qayyum Moh Salleh
Published 2013“…The system optimizes the aligning DNA fragment using Smith-Waterman algorithm with a pattern recognition algorithm. …”
Get full text
Get full text
Student Project -
11
Design and analysis of DNA sequence alignment module using Smith-Waterman scoring pattern: article / Wan Abdul Qayyum Moh Salleh and A.K. Halim
Published 2013“…The system optimizes the aligning DNA fragment using Smith-Waterman algorithm with a pattern recognition algorithm. …”
Get full text
Get full text
Article -
12
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…The verification and simulation report illustrate that the module and improved algorithm has successfully been executed to deliver a report of tracking that is in accordance with the requirements of administering Halal goods. …”
Get full text
Get full text
Thesis -
13
Fuzzy logic based mppt control for a thermoelectric generator system
Published 2022“…In addition, a boost converter having a Fuzzy Logic Controller (FLC) based MPPT algorithm was added to the TEG modeling. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…Likewise, the widely used standard verification simulation tool AVISPA is used to verify that the scheme is secure against passive and active attacks. …”
Get full text
Get full text
Thesis -
15
Dynamic modelling of a single link flexible manipulator in vertical motion using swarm and genetic optimisation
Published 2009“…In this research, particle swann optimisation (PSO) and genetic algorithm (GA) are used to model a single-link flexible manipulator. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
User authentication using neural network in smart home
Published 2009“…Smart home networks consist of a wide range of wired or wireless devices, there is possibility that illegal access to some restricted data or devices may happen. Password-based authentication is widely used to identify authorize users, because this method is cheap, easy and quite accurate. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
Published 2017“…It employs multi-level detection based on identity and position verification. Then, a trust algorithm is applied based on the energy of each sensor node. …”
Get full text
Get full text
Get full text
Article -
18
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
Published 2018“…The proposed framework is rigorously evaluated through several experiments, including emulation and simulation. The verification of both experiments is made with current state-of-the-art algorithms. …”
Get full text
Get full text
Get full text
Thesis -
19
Application of Neural Network in User Authentication for Smart Home System
Published 2009“…Smart home networks consist of a wide range of wired or wireless devices, there is possibility that illegal access to some restricted data or devices may happen. Password-based authentication is widely used to identify authorize users, because this method is cheap, easy and quite accurate. …”
Get full text
Get full text
Get full text
Article -
20
Fuzzy-Pid Based Controler For Active Vibration Control Of Nonlinear Dynamic Systems
Published 2019“…Initially, the experimental rig was designed and integrated with the instrumentation system for vibration data collection purpose. The vibration data obtained experimentally was used to model the dynamic system based on auto-regressive with exogenous input structure using evolutionary swarm algorithm. …”
Get full text
Get full text
Get full text
Proceeding
