Search Results - (( simulation identification based algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- simulation identification »
- identification based »
- implementation level »
- java implementation »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Opposition- based simulated kalman filters and their application in system identification
Published 2017“…Among the various kinds of optimization algorithms, Simulated Kalman Filter (SKF) is a new population-based optimization algorithm inspired by the estimation capability of Kalman Filter. …”
Get full text
Get full text
Thesis -
3
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Iterative closed-loop identification of MIMO systems using ARX-based Leaky Least Mean Square Algorithm
Published 2014Get full text
Get full text
Conference or Workshop Item -
5
Simultaneous computation of model order and parameter estimation for system identification based on opposition-based simulated Kalman filter
Published 2018“…Current optimum opposition-based simulated Kalman filter (COOBSKF) is an improved version of simulated Kalman filter (SKF) which employs the concept of current optimum opposition-based learning (COOBL). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
7
A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens
Published 2017“…Therefore, the aim of this study is to propose a robust algorithm for a firearm identification based on extracting a set of informative features from the segmented region of interest (ROI) using the simulated noisy center-firing pin impression images. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Simultaneous Computation of Model Order and Parameter Estimation for System Identification Based on Gravitational Search Algorithm
Published 2015“…In this paper, a technique termed as Simultaneous Model Order and Parameter Estimation (SMOPE), which is specifically based on Gravitational Search Algorithm (GSA) is proposed to combine model order selection and parameter estimation in one process. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Identification of hammerstain model using stochastic perturbation simultaneous approximation
Published 2016“…A numerical example is given to illustrate that the SPSA based algorithms can give accurate parameter estimate of the Hammerstein models with high probability through detailed simulation.…”
Get full text
Get full text
Undergraduates Project Papers -
10
Date store management in sliding window based on-line identification algorithms
Published 2001Get full text
Get full text
Conference or Workshop Item -
11
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
Get full text
Get full text
Get full text
Article -
12
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The results of the verification of the system algorithm on the simulated 3D areal surface topography of a sloped bumps shows that the system algorithm can effectively identified the edges features and segmented them following the shape partem of the surface features of the sloped bumps. …”
Get full text
Get full text
Thesis -
13
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Published 2022“…The results also demonstrate FCMBG bettered other grouping-based algorithms (GB-DFSA and GBSA) whose tag estimation method are based on collision slots in terms slot efficiency by over 10% and also in terms of identification time.…”
Get full text
Get full text
Article -
14
Hazard identification on fractionation column using rule based expert system
Published 2001“…The process-specific knowledge, which consists of process operation data and the process flow sheet, has been constructed using a HYSIS process simulator. The process-general knowledge which consists of rule-based expert system is developed from simulation result obtained from HYSIS process simulator. …”
Get full text
Get full text
Article -
15
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
16
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
17
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
18
-
19
High impedance fault detection and identification based on pattern recognition of phase displacement computation
Published 2018“…Subsequently, an automatic HIF classification algorithm based on predefined indices is proposed to perform event identification and HIF detection. …”
Get full text
Get full text
Article -
20
Discrete-Time System Identification Based On Novel Information Criterion Using Genetic Algorithm
Published 2017“…This paper investigates the identification of dynamic system in the form of NARX (Non-linear AutoRegressive with eXogenous input) model based on PMIC2 and AIC using GA. …”
Get full text
Get full text
Get full text
Get full text
Article
