Search Results - (( model validation based algorithm ) OR ( field communication system algorithm ))
Search alternatives:
- field communication »
- validation based »
- system algorithm »
-
1
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Foreground segmentation-based human detection with shadow removal
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
5
Machine learning‐based approach for bandwidth and frequency prediction of circular SIW antenna
Published 2025“…The approach was validated through Computer Simulation Technology (CST) simulations and ML-based predictions, both demonstrating strong agreement. …”
Get full text
Get full text
Get full text
Article -
6
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014Get full text
Get full text
Undergraduates Project Papers -
7
-
8
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…Secondly, the ML models offer better and consistent risk prediction models as compared to LRA-based model. …”
Get full text
Get full text
Thesis -
9
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
Get full text
Get full text
Get full text
Thesis -
10
Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA
Published 2023“…The system can cipher the data using PRINCE algorithm on a VIRTEX-403 FPGA evaluation board and using GSM modems to communicate over a cellular network. …”
Article -
11
Securing electrical substation's wireless messaging with a lightweight crypto-algorithm IP core
Published 2023“…The crypto-algorithm has been implemented within an environment of microprocessor system on a XILINX Field Programmable Logic Arrays chip. …”
Conference Paper -
12
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Dynamic modelling of a flexible beam structure using feedforward neural networks for active vibration control
Published 2019“…Correlation tests were used to validate the obtained model. Based on the proposed method, a small mean squared error value has been achieved in the validation phase. …”
Get full text
Get full text
Get full text
Article -
14
Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm
Published 2023“…Lastly, a study of the industrial case was performed as a validation of the developed model and algorithm. An automotive company is selected, and the collected actual data is used for validation purposes. …”
Get full text
Get full text
Thesis -
15
Model structure selection for a discrete-time non-linear system using genetic algorithm
Published 2004“…The adequacy of the developed models is tested using one-step-ahead prediction and correlation-based model validation tests. …”
Get full text
Get full text
Get full text
Article -
16
Analysis of Toothbrush Rig Parameter Estimation Using Different Model Orders in Real Coded Genetic Algorithm (RCGA)
Published 2024“…The validation test-through correlation analysis was used to validate the model. …”
Article -
17
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The adequacy of the developed models is tested using one-step-ahead prediction and correlation-based model validation tests. …”
Get full text
Get full text
Article -
18
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The adequacy of the developed models is tested using one-step-ahead prediction and correlation-based model validation tests. …”
Get full text
Get full text
Article -
19
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The results of the validation show a complete similarity between each original face and the output from our algorithm. …”
Get full text
Get full text
Thesis -
20
Analysis of toothbrush rig parameter estimation using different model orders in Real-Coded Genetic Algorithm (RCGA)
Published 2018“…The validation test-through correlation analysis was used to validate the model. …”
Get full text
Article
