Search Results - (( java evaluation method algorithm ) OR ( program implementing connection algorithm ))
Search alternatives:
- implementing connection »
- program implementing »
- connection algorithm »
- method algorithm »
- java evaluation »
-
1
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
2
Deterministic static sensor node placement in wireless sensor network based on territorial predator scent marking behavior
Published 2023“…The main objectives considered in this paper are to achieve maximum coverage and minimum energy consumption with guaranteed connectivity. A simulation study has been carried out to compare the performance of the proposed algorithm implemented in two different single objective approaches with an Integer Linear Programming based algorithm and another biological inspired algorithm. …”
Article -
3
Control algorithm for two-tank system using multiparametric programming
Published 2023“…In conclusion, the implementation of multiparametric programming is able to estimate the value of the output for the control algorithm of the two-tank system.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network
Published 2017“…In order to achieve this objective, each node must be connected in its shortest way as possible. We start our algorithm by designing shortest path algorithm based on Dijkstra's method. …”
Get full text
Get full text
Get full text
Article -
5
Security mechanism for wireless Mobile Ad Hoc Networks (MANET)
Published 2006“…This report provides an overview of wireless ad hoc networks, wireless threats, cryptography background and the security algorithms for this encryption method. The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
Get full text
Get full text
Student Project -
6
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
7
-
8
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
9
Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.]
Published 2011“…In order to enhance the implementation of the algorithm, it is necesssary to develop an efficient computation program together with the user's interface. …”
Get full text
Get full text
Research Reports -
10
Design And Development Of Gas Argon Purging System
Published 2006“…AMPL is used in two ways of connection of its programming, first is Data Base, and second is PC element. …”
Get full text
Get full text
Monograph -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
Modular motor driver with torque control for gripping mechanism
Published 2023“…This is possible by taking in the magnitude of the current drawn by the load as the feedback to the system and set appropriate action to protect the system from damage when a certain setpoint of current is reached. In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
13
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…To help engineers select the best metaheuristic algorithms for their problems, there is a need to evaluate the performance of different metaheuristic algorithms against each other using common case studies. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Moving detection using cellular neural network (CNN)
Published 2008“…The templates are programmed in MATLAB. There are few rules in Cellular Neural Network that has to be implemented when programming the templates, such as the state equation, output equation, boundary condition and also the initial value. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Comparisons are done between systems implementing authentication and those that do not. The results show that the average delay is not much affected by the implementation of the program. …”
Get full text
Get full text
Thesis -
16
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…An experimental analysis is conducted by several experiments to evaluate the performance of the proposed ensemble methods which has been tested on the 4 benchmark datasets, namely LingSpam, SpamAssassin, Spambase and CSDMC2010. …”
Get full text
Get full text
Thesis -
17
-
18
Fuzzy state space modeling for solving inverse problems in multivariable dynamic systems
Published 2005“…To facilitate the implementation of these algorithms, a semi-automated computational tool using Matlab® programming facilities is developed. …”
Get full text
Get full text
Thesis -
19
Development of adaptive perturb and observe-fuzzy control maximum power point tracking for photovoltaic boost dc-dc converter
Published 2014“…For hardware implementation, the proposed adaptive P&O-fuzzy control MPPT was programmed in TMS320F28335 digital signal processing board. …”
Get full text
Get full text
Article -
20
Improved ADALINE Harmonics Extraction Algorithm for Boosting Performance of Photovoltaic Shunt Active Power Filter under Dynamic Operations
Published 2016“…For hardware implementation, laboratory prototype has been developed and the proposed algorithm was programmed in TMS320F28335 DSP board. …”
Get full text
Get full text
Article
