Search Results - (( data simulation model algorithm ) OR ( data verification using algorithm ))
Search alternatives:
- verification using »
- data verification »
- data simulation »
- model algorithm »
- using algorithm »
-
1
Modeling And Control Of V-Groove Rotary Impact Driver
Published 2020“…The speed is optimized by using state-flow algorithm with fixed-point data types, thus reduced hardware computational requirement with acceptable accuracy. …”
Get full text
Get full text
Thesis -
2
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
3
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
4
Artificial neural network model for predicting windstorm intensity and the potential damages / Mohd Fatruz Bachok
Published 2019“…This development corresponds to the windstorm hazard monitoring mechanism which is not available in the country. The predictive model includes 16 prediction processes with 20 back-propagation algorithms whereby radar imageries and meteorological station data were used as a raw data input. …”
Get full text
Get full text
Thesis -
5
Fuzzy Mixed Assembly Line Sequencing and Scheduling Optimization Model Using Multiobjective Dynamic Fuzzy GA
Published 2014“…The simulation results highlight that the performance and efficacy of the proposed novel optimization algorithm are more efficient than the performance of the standard genetic algorithm in mixed assembly line sequencing model.…”
Get full text
Get full text
Get full text
Article -
6
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…The MD5 hash function modelling was done using Verilog, compiled with a few targeted virtual Altera Quartus devices, and simulated using ModelSim. …”
Get full text
Get full text
Get full text
Article -
7
Simulation of single and dual layered rapid pressure swing adsorption
Published 2013“…A dual layered RPSA model is then developed. Verification of the applied numerical methods and computer programs are carried out successfully that the simulated results agree well with the analytical solutions and experimental data. …”
Get full text
Get full text
Thesis -
8
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…We classify the cluster group that exceeds the stopping rule as potential outliers. Model verification of all method and model proposed in this study are examined using the simulation study. …”
Get full text
Get full text
Thesis -
9
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…The MD5 hash function modelling was done using Verilog, compiled with a few targeted virtual Altera Quartus devices, and simulated using ModelSim. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
REAL AND SIMULATED MASKED FACE RECOGNITION WITH A PRE-TRAINED MODEL
Published 2023“…This change has encouraged the use of collaboration to resolve the related issues, which has resulted in the development of algorithms for face occlusion, collection of data on masked and unmasked faces and improvement of pre-trained models. …”
Get full text
Get full text
Get full text
Article -
11
Real and simulated masked face recognition with a pre-trained model
Published 2023“…This change has encouraged the use of collaboration to resolve the related issues, which has resulted in the development of algorithms for face occlusion, collection of data on masked and unmasked faces and improvement of pre-trained models. …”
Get full text
Get full text
Get full text
Article -
12
Optimization of solenoid driver and controller for gaseous fuel high-pressure direct injector using model-based approach
Published 2022“…Data-driven modelling using a one-stage plan and an Interpolating Radial Basis Function (RBF) model was generated based on data collected from the injector simulation. …”
Get full text
Get full text
Thesis -
13
Frit-based controller tuning of a dc-dc boost converter
Published 2022“…This report presents a Fictitious Reference Iterative Tuning design for a DC-DC boost converter based on a Model-Free approach. A Fictitious Reference Iterative Tuning is a data-driven controller tuning technique that uses one-shot experimental data to construct the input controller of an undefined plant model. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Fuzzy logic based mppt control for a thermoelectric generator system
Published 2022“…In addition, a boost converter having a Fuzzy Logic Controller (FLC) based MPPT algorithm was added to the TEG modeling. After the TEG output equations were determined, the TEG modeling was performed based on manufacturer data sheets. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Dynamic modelling of a single link flexible manipulator in vertical motion using swarm and genetic optimisation
Published 2009“…In this research, particle swann optimisation (PSO) and genetic algorithm (GA) are used to model a single-link flexible manipulator. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
Published 2018“…The simulation results were then verified using statistical modelling and t-tests. …”
Get full text
Get full text
Get full text
Thesis -
17
Development and Application of a Finite Element Distributed Rainfall Runoff Simulation Model
Published 2000“…Maximum infiltration, overland flow discharge, and overland with channel flow discharge were observed for model verification. Finite element simulations have been shown to compare favourably with observed laboratory data. …”
Get full text
Get full text
Thesis -
18
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
Published 2023“…The protocol's security was proved using the formal verification ROR model and automated security verifier ProVerif tool to validate the protocol resistance against various attacks and provided forward secrecy. …”
Get full text
Get full text
Article -
19
A fictitious reference iterative tuning method for buck converter-powered DC motor control system
Published 2019“…This paper presents a model-free optimization algorithm for a PID controller based on Fictitious Reference Iterative Tuning and Simulated Kalman Filter. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Comparision Between Adaptive Digital Base Band Predistortion Technique And Other Techniques For Power Amplifier
Published 2008“…In this thesis, Saleh model was used as a model of power amplifier and been compared with the others results of the model for verification. …”
Get full text
Get full text
Thesis
