Search Results - (( java implementation level algorithm ) OR ( parallel identification system algorithm ))
Search alternatives:
- parallel identification »
- identification system »
- implementation level »
- java implementation »
- system algorithm »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models.
Published 2022“…Another method is system identification which is also called experimental modeling. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Parallel implementation of genomic sequences classification using modified gabor wavelet transform on multicore systems
Published 2012“…This paper presents the parallel implementation of the gene and exon identification of DNA sequences using the previously developed modified Gabor wavelet transform on multicore systems. …”
Get full text
Get full text
Proceeding Paper -
4
Design and implementation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayawi
Published 2015“…These effects, if not controlled, would lead to large scale oscillations that would damage system components. System identification is a prerequisite to analysis of a dynamic system. …”
Get full text
Get full text
Thesis -
5
A comparison study between integrated OBFARX-NN and OBF-NN for modeling of nonlinear systems in extended regions of operation
Published 2014“…In this paper the combination of linear and nonlinear models in parallel for nonlinear system identification is investigated. …”
Get full text
Get full text
Article -
6
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Integrated OBF-NN models for extrapolation enhancement in conventional neural networks for nonlinear systems
Published 2011“…Abstract In this paper the integration of linear and nonlinear models in parallel for nonlinear system identification is investigated. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Wavelet network based online sequential extreme learning machine for dynamic system modeling
Published 2013“…The proposed model used as system identification for nonlinear dynamic systems. …”
Get full text
Conference or Workshop Item -
10
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
11
Small-scale helicopter system identification model using recurrent neural networks
Published 2010Get full text
Get full text
Conference or Workshop Item -
12
Hybrid intelligent methods for parameter identification and load frequency control in power system
Published 2014“…Where, in the first part, the coherent identification algorithm for single and multi-area power systems with disturbances is proposed. …”
Get full text
Get full text
Thesis -
13
Efficient hardware design for palm-dorsa vein image enhancement
Published 2018“…Vein biometric system uses the pattern of veins in the human body as a unique identification. …”
Get full text
Get full text
Get full text
Thesis -
14
Integrated OBF-NN models with enhanced extrapolation capability for nonlinear systems
Published 2013“…This paper proposes a nonlinear system identification using parallel linear-plus-neural network models that provide more accurate predictions on the process behavior even on extrapolated regions. …”
Get full text
Get full text
Get full text
Citation Index Journal -
15
-
16
A Parallel-Model Speech Emotion Recognition Network Based on Feature Clustering
Published 2023“…Although researchers have made progress in speech emotion feature extraction and model identification, they have struggled to create an SER system with satisfactory recognition accuracy. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
A parallel-model speech emotion recognition network based on feature clustering
Published 2023“…Although researchers have made progress in speech emotion feature extraction and model identification, they have struggled to create an SER system with satisfactory recognition accuracy. …”
Get full text
Get full text
Get full text
Article -
18
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
19
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
20
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article
