Search Results - (( based constructing system algorithm ) OR ( data validation using algorithm ))
Search alternatives:
- constructing system »
- based constructing »
- system algorithm »
- validation using »
- data validation »
- using algorithm »
-
1
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
3
Parametric system identification and active vibration control of vibrational structures using genetic algorithm
Published 2007“…The sets of data obtained were utilised to develop ARX model using Least Squares (LS), Recursive Least Squares (RLS) and Genetic Algorithm (GA) methods. …”
Get full text
Get full text
Thesis -
4
PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah
Published 2017“…System Identification, a discipline for constructing models from dynamic systems, consist of three major steps: structure selection, parameter estimation and model validation. …”
Get full text
Get full text
Thesis -
5
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…The algorithms are successfully designed using the Altera Quartus II platform. …”
Get full text
Get full text
Get full text
Proceeding -
6
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Nowadays, fingerprinting based Wi-Fi positioning systems successfully provide location information to mobile users. …”
Get full text
Get full text
Conference or Workshop Item -
8
Effective gene selection techniques for classification of gene expression data
Published 2005“…Support Vector Machine (SVM) and k-nearest neighbour (knn) are used for the classification purposes. The proposed approach is validated using leave one out cross validation (LOOCV). …”
Get full text
Get full text
Thesis -
9
Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios
Published 2015“…Long Ashton Research Station-Weather Generator (LARS-WG) model is used firstly which was calibrated and validated using daily observed sunshine hours, rainfall, minimum and maximum temperature data. …”
Get full text
Get full text
Get full text
Thesis -
10
Agreement options for negotiation on material location decision of housing development
Published 2020“…Analytical hierarchy process based on satisficing option was applied for decision process and game theory-based agent system for coalition formation. …”
Get full text
Get full text
Article -
11
-
12
Frit-based controller tuning of a dc-dc boost converter
Published 2022“…This report presents a Fictitious Reference Iterative Tuning design for a DC-DC boost converter based on a Model-Free approach. A Fictitious Reference Iterative Tuning is a data-driven controller tuning technique that uses one-shot experimental data to construct the input controller of an undefined plant model. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks
Published 2024“…Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Time series modeling of water level at Sulaiman Station, Klang River, Malaysia
Published 2010“…Using the cross validation method the best training subset is selected to train the ANFIS model based on that dataset. …”
Get full text
Get full text
Thesis -
15
Reservoir Inflow Forecasting Using Artificial Neural Network and Adaptive Neuro-Fuzzy Inference System Techniques
Published 2007“…Cross validation of training and validation data sets was also considered to obtain the best data set. …”
Get full text
Get full text
Thesis -
16
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.]
Published 2024“…Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
Get full text
Get full text
Article -
17
SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid
Published 2017“…The research aims to evaluate the performance and hydrological response of the Soil Water Assessment Tool (SWAT) process-based model in tropical river basin using Malaysia soil data. …”
Get full text
Get full text
Thesis -
18
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…To stop the increase in cybercrimes, everyone, including normal citizens, needs to know how secure they are while using digital appliances. A system is developed to predict the risk of users based on their behaviour when they are online using real-life behavioural data obtained from a private university’s 207 undergraduates. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
20
Evaluating and predicting overall equipment effectiveness for deep water disposal pump using ANNGA analysis approach / Soud Al-Toubi, Babakalli Alkali, David Harrison and Sudhir C....
Published 2023“…The ANN-GA model was developed based on six big losses over eighteen successive months of the operating period to evaluate the current and future performance of the DWD system. 70% of the data was used for training and 15% for each data validation and testing. …”
Get full text
Get full text
Get full text
Article
