Search Results - (( using function based algorithm ) OR ( software verification method algorithm ))
Search alternatives:
- software verification »
- verification method »
- method algorithm »
- using function »
-
1
-
2
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…To validate our proposed approach, we also carried simulation using a publicly available benchmark data-set with K-fold cross validation to exhibit the performance of the proposed method. The verification of the proposed approach is made with current state-of-the-art algorithms. …”
Get full text
Get full text
Thesis -
3
A fictitious reference iterative tuning method for buck converter-powered DC motor control system
Published 2019“…Simulation analyses using Matlab Software have been conducted for results validation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
Get full text
Get full text
Thesis -
5
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…Verification algorithm is developed using MATLAB (SIMULINK) function blocks which is capable of authenticating a person's identity by his or her voice pattern. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
-
8
-
9
Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana
Published 2024“…In order to minimize the computational time of numerical WAAM simulation, two method has been proposed. The first method is utilizing the lumping layering of WAAM deposition to minimize the numbers of elements and the second method is by using Inherent Strain Method (ISM) with the help of commercial finite element software MSC Marc/Mentat. …”
Get full text
Get full text
Thesis -
10
Noise removal methodologies for lung cancer diagnosis
Published 2019“…Therefore, the algorithm will be developed and implemented in MATLAB software. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
11
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The results of the verification of the system algorithm on the simulated 3D areal surface topography of a sloped bumps shows that the system algorithm can effectively identified the edges features and segmented them following the shape partem of the surface features of the sloped bumps. …”
Get full text
Get full text
Thesis -
12
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The BOGS-BAT algorithm is based on three techniques. The first technique is to move or switch solution from single function to functions that contain more than one objective functions. …”
Get full text
Get full text
Thesis -
13
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
14
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
15
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
Get full text
Get full text
Get full text
Article -
16
Verification of volume-of-fluid (VOF) simulation for thin liquid film applications
Published 2023“…This paper describes the application of the built-in Volume-of-Fluid (VOF) model in the commercial Computational Fluid Dynamics (CFD) software FLUENTTM and the verification of its accuracy. …”
Conference paper -
17
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. …”
Get full text
Get full text
Conference or Workshop Item -
18
An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation
Published 2016“…Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
Get full text
Get full text
Get full text
Thesis -
19
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Utilizing the properties of Lucas functions introduced a public key system based on Lucas functions instead of exponentiation, which offer a good alternative to the most publicly used exponential public key system RSA. …”
Get full text
Get full text
Thesis -
20
Image encryption algorithm based on chaotic mapping
Published 2003“…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
Get full text
Get full text
Get full text
Article
