Search Results - (( based verification method algorithm ) OR ( using solution using algorithm ))

Refine Results
  1. 1

    Development Of Analytical Solution For Thermo-Mechanical Stresses Of Multilayered Pressure Vessel Based On Recursive Algorithm by Sim, Lih Chi

    Published 2022
    “…Recent studies showed that analytical solution based on recursive algorithm can be used to obtain thermo-mechanical stresses of multilayered structure efficiently. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system by Jasni, Jasronita

    Published 2010
    “…Furthermore, the real data with 293 buses and 595 lines is used as a practical system for verification of the new algorithms The results show that these new algorithms are able to eliminate the convergence problem faced by the existing CPF algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Continuation power flow for voltage stability assessment / Mohd Zamri Laton by Laton, Mohd Zamri

    Published 2006
    “…The continuation power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Dual Recurrent Neural Network-based Hybrid Approach for Solving Convex Quadratic Bi-Level Programming Problem by WATADA, J., ROY, A., LI, J., WANG, B., WANG, S.

    Published 2020
    “…The accuracy and efficiency of the proposed method have been found better than the existing and widely used approaches, while doing experimental verification using four well-known examples used in prior works. …”
    Get full text
    Get full text
    Article
  5. 5

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…The modal frequencies of the tower are evaluated under various conditions of damage in concrete and connection in different parts of the tower by using finite element simulation. The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Load flow study comparison between Newton Raphson load flow method and fast decouple load flow method / Mohd Haizilan Alias by Alias, Mohd Haizilan

    Published 2007
    “…The method of power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An enhanced motion planning method for industrial robots based on the digital twin concept by Rui, Fan

    Published 2025
    “…This study proposes a novel motion planning method for six-degree-of-freedom industrial robots based on DT technology. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development of a novel natural frequencies prediction tool for laminated composite plates using integrated artificial neural network (ANN) - simulink MATLAB / Mohd Arif Mat Norman by Mat Norman, Mohd Arif

    Published 2024
    “…The prediction tool utilises an Artificial Neural Network (ANN) with a two-layer feed-forward algorithm and ten hidden layers, using Levenberg-Marquardt as the training algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption by Siti Aishah, Rusdan, Tarlochan, Faris, Mohamad Rusydi, Mohamad Yasin

    Published 2013
    “…The optimal design is obtained by using the constrained nonlinear multivariable optimization algorithm provided by MATLAB. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei by Hamid , Tahaei

    Published 2018
    “…The proposed framework is rigorously evaluated through several experiments, including emulation and simulation. The verification of both experiments is made with current state-of-the-art algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…We model the solution in the real setting of SDNs using High Level Petri Nets (HLPN), analyze the rules with Z language, and formally verified the correct functioning using Z3 SMT solver. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    An efficient technique for human verification using finger stripes geometry by Rahman, Md. Arafatur, Azad, Md. Saiful, Anwar, Farhat

    Published 2007
    “…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Face identification and verification using PCA and LDA by Chan, Lih Heng, Shaikh Salleh, Sheikh Hussain, Ting, Chee Ming, Ariff, Ahmad Kamarul

    Published 2008
    “…Algorithms based on PCA (Principal Components Analysis) and LDA (Linear Discriminant Analysis) are among the most popular appearance-based approaches in face recognition. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20