Search Results - (( model validation study algorithm ) OR ( safety communication based algorithm ))
Search alternatives:
-
1
Machine learning modeling for radiofrequency electromagnetic fields (RF-EMF) signals from mmWave 5G signals
Published 2023“…This study proposes two prediction models. The first model predicts the signal beam RF-EMF, while the second predicts the base station RF-EMF. …”
Get full text
Get full text
Article -
2
VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS
Published 2012“…The trust is established via Trusted Platform Module (TPM) and group communication. In this study, the proposed framework methods are simulated using two propagation models, i.e. two ray ground model and Nakagami model for VANET environment (802.11p). …”
Get full text
Get full text
Thesis -
3
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Finally, a case study of a WSN-based SHM system using developed embedded data filtering and transmission algorithms to reduce data communication is performed and taken place on a concrete beam at Civil Engineering Structure Laboratory, UPM. …”
Get full text
Get full text
Thesis -
5
Vehicle communications: Sensitive node election SNE algorithm achieves optimized QoS
Published 2026“…Furthermore, the SNE algorithm uses a metric based on transmission distance and can dynamically adapt to application requirements, such as prioritizing it provides high throughput and minimized delay. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
Get full text
Get full text
Get full text
Thesis -
8
Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications
Published 2019“…This has led to unstable clusters which could affect the timely delivery of safety applications. In this study, enhanced weight-based clustering algorithm (EWCA) was developed to address these challenges. …”
Get full text
Get full text
Article -
9
Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal
Published 2020“…Vehicular Ad hoc Network technology (VANET) is one of the emerging and promising wireless technology, providing support for vehicles to communicate and share resources, (such as safety messages) through vehicle-to-vehicle (V2V) communications. …”
Get full text
Get full text
Get full text
Thesis -
10
Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm
Published 2023“…Lastly, a study of the industrial case was performed as a validation of the developed model and algorithm. …”
Get full text
Get full text
Thesis -
11
A taxonomy for congestion control algorithms in vehicular ad hoc networks
Published 2012Get full text
Get full text
Conference or Workshop Item -
12
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…However, the conversion of a complex form of ML algorithms into a simple statistical model is the prime concern. …”
Get full text
Get full text
Thesis -
13
-
14
Development of collision avoidance system for multiple autonomous mobile robots
Published 2023Article -
15
Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)...
Published 2013“…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
Get full text
Get full text
Article -
16
An Efficient Route Selection Based on AODV Algorithm for VANET
Published 2016“…Simulation result shown that VANET modified algorithm based on average signal strength has the advantage of choosing the optimum route to deliver data and own enhanced ratio (17%) by comparing with a maximum signal strength route.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Cyber vulnerabilities in smart grid and safety measures for energy meters in advanced metering system and smart meter communications
Published 2023“…Based on such requirement, this paper has proposed a lightweight and easily implementable safety measure for Advanced Metering Infrastructure (AMI) using ChaCha20 encryption model. …”
Article -
18
A deep reinforcement learning hybrid algorithm for the computational discovery and characterization of small proteins utilizing mycobacterium tuberculosis as a model
Published 2025“…While the focus was on comparing standalone and hybrid models, the study identifies opportunities for future benchmarking against external tools to further validate its contributions. …”
Get full text
Get full text
Thesis -
19
An Efficient Route Selection based on AODV Algorithm for VANET
Published 2016“…Simulation tested two of distance ranges among nodes (Long & Short) and the result shown that VANET modified algorithm based on average signal strength has the advantage of choosing the optimum route to deliver data and own enhanced ratio according to the distances (17.5% & 24.1%) by comparing with a maximum signal strength route.…”
Get full text
Get full text
Get full text
Article -
20
Design of A unmanned aerial vehicles assisted search and rescue collaboration architecture for emergency communication systems / Abdu Ahmed Saif Ahmed
Published 2022“…This thesis addresses these issues by studying a theoretical framework for designing and analyzing emergency communication system (ECS) algorithms for post-disaster recovery. …”
Get full text
Get full text
Get full text
Thesis
