Search Results - (( data verification using algorithm ) OR ( wave optimization based algorithm ))
Search alternatives:
- verification using »
- data verification »
- wave optimization »
- using algorithm »
-
1
-
2
Optimizing the efficiency of Oscillating Water Column (OWC) wave energy converter using genetic algorithm
Published 2015“…This paper, describes a method to maximize the pneumatic system efficiency using optimization technique based on Genetic algorithm. This method involves an extraction of maximum incident wave energy corresponding to the wave height, determining of the best deep water length and maximizing the applied damping ratio which can lead to an increase in the pneumatic system efficiency. …”
Get full text
Get full text
Article -
3
Healthcare Data Analysis Using Water Wave Optimization-Based Diagnostic Model
Published 2021“…In the proposed diagnostic model, a water wave optimization (WWO) algorithm was implemented for improving the diagnosis accuracy. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
-
6
Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G
Published 2021“…We propose effective alternating minimization algorithms based on the zero gradient method to establish fully-connected structures (FCSs) and partially-connected structures (PCSs). …”
Get full text
Get full text
Article -
7
Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G
Published 2021“…We propose effective alternating minimization algorithms based on the zero gradient method to establish fully-connected structures (FCSs) and partially-connected structures (PCSs). …”
Get full text
Get full text
Article -
8
Enhanced weight-optimized recurrent neural networks based on sine cosine algorithm for wave height prediction
Published 2021“…Therefore, the wind plays an essential role in the oceanic atmosphere and contributes to the formation of waves. This paper proposes an enhanced weight-optimized neural network based on Sine Cosine Algorithm (SCA) to accurately predict the wave height. …”
Get full text
Get full text
Article -
9
Optimized controllers for stabilizing the frequency changes in hybrid wind-photovoltaic-wave energy-based maritime microgrid systems
Published 2024“…Furthermore, an Archimedes optimization algorithm (AOA) is used to optimize the 2DOF-TIDN controller. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
14
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
Get full text
Get full text
Thesis -
15
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
17
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
18
Selective opposition based constrained barnacle mating optimization: Theory and applications
Published 2024“…Mathematical models of Barnacle Mating Optimization (BMO) are based on observations of real-world barnacle mating behaviors such as sperm casting and self-fertilization. …”
Get full text
Get full text
Get full text
Article -
19
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
20
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The proposed algorithm will switch its working pattern based on the goal minimum and boundary maximum index distances. …”
Get full text
Thesis
