Search Results - (( parameter simulation based algorithm ) OR ( process verification using algorithm ))
Search alternatives:
- parameter simulation »
- process verification »
- verification using »
- simulation based »
- using algorithm »
-
1
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…The algorithm complexity analysis was used to measure the execution time in the worst case. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Towards a self-adaptive agent-based simulation model
Published 2023“…Currently, parameters and environments are simulated by a domain-specific model that is strictly used proprietarily by the ABS model developer. …”
Article -
3
Sensor-less vector control using adaptive observer scheme for controlling the performance of the induction motor / Mazhar Hussain Abbasi
Published 2013“…Simulation is done by using the observer which uses optimal feedback gain as an example of process from algorithm design to verification of logic. …”
Get full text
Get full text
Thesis -
4
Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana
Published 2024“…The development of numerical simulation model started by the geometrical modelling followed by material modelling based on real scanned material using JMATPRO. …”
Get full text
Get full text
Thesis -
5
Dynamic modelling and control of a flexible manipulator
Published 2003“…The command shaping techniques are designed based on the parameters of the system obtained using the unshaped bang-bang torque input. …”
Get full text
Get full text
Get full text
Thesis -
6
Mechanical and grain growth behaviour of wire-arc additive manufacturing (WAAM) of SS316L using experiment and numerical simulation / Muhd Faiz Mat @ Muhammad
Published 2022“…The initial phase is the material verification and selection of the WAAM SS316L process parameters for thick wall structure using a Robotic welding system. …”
Get full text
Get full text
Thesis -
7
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
8
Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption
Published 2013“…Ahmad FE model. Based on the verification process, deformation mode and energy absorption predicted by the developed FE model agree with the validated FE model. …”
Get full text
Get full text
Conference or Workshop Item -
9
E-voting system with physical verification using OTP algorithm / Badrul Amin Mohd Kassim
Published 2021Get full text
Get full text
Student Project -
10
A simulation based fly optimisation algorithm for swarms of mini autonomous surface vehicles application
Published 2011“…The optimal simulation parameters can be used for the real application. …”
Get full text
Get full text
Get full text
Article -
11
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Optimization of turning parameters using genetic algorithm method
Published 2008“…The simulation based on Genetic Algorithm are successful develop and the optimum parameters values are obtained from the simulation.…”
Get full text
Get full text
Undergraduates Project Papers -
13
PSAT : a pairwise test data generation tool based on simulated annealing algorithm
Published 2015“…This research is about the research on developing a Pairwise Test Data Generation Tool based on Simulated Annealing (SA) algorithm which named as PSAT. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Optimization of milling parameters using ant colony optimization
Published 2008“…The simulation based on ACO algorithm are successful develop and the optimization of parameters values is to maximize the production rate is obtain from the simulation.…”
Get full text
Get full text
Undergraduates Project Papers -
15
The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed
Published 2024Subjects:Conference Paper -
16
Parameter-Less Simulated Kalman Filter
Published 2017“…Simulated Kalman Filter (SKF) algorithm is a new population-based metaheuristic optimization algorithm. …”
Get full text
Get full text
Get full text
Article -
17
An efficient technique for human verification using finger stripes geometry
Published 2007“…Finger stripe geometry is a new biometric type in verification process. This finger stripe based verification consists of two main attributes, feature extraction by image processing and feature learning by ANN (Artificial Neural Network). …”
Get full text
Get full text
Get full text
Article -
18
GENETIC ALGORITHM WITH DEEP NEURAL NETWORK SURROGATE FOR THE OPTIMIZATION OF ELECTROMAGNETIC STRUCTURE
Published 2020“…The behavior of Genetic Algorithm (GA) where it generates and evolves the parameters towards a high-quality solution gives an advantage in obtaining ideal combination of parameters to fit in with the simulation. …”
Get full text
Get full text
Final Year Project -
19
The effect of GA parameters on the performance of GA-based QoS routing algorithm
Published 2023“…This paper presents the simulation result of the effect of three GA parameters which are maximum iterations, population size and mutation probability on the developed algorithm. � 2008 IEEE.…”
Conference paper -
20
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis
