Search Results - (( using identification using algorithm ) OR ( java evaluation method algorithm ))
Search alternatives:
- using identification »
- identification using »
- method algorithm »
- using algorithm »
- java evaluation »
-
1
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
Get full text
Get full text
Thesis -
3
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Design/methodology/approach – In this study, flight data were collected and analyzed; MATLAB-based system identification algorithm was developed using DE and PEM; parameterized state-space model parameters were estimated using the developed algorithm and model dynamic analysis. …”
Get full text
Get full text
Get full text
Article -
5
Multivariable system identification for dynamic discrete-time nonlinear system using genetic algorithm
Published 2002“…The development of a multivariable system identification model for dynamic discrete-time nonlinear system using genetic algorithm was discussed and analysed. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
8
Multivariable system identification for dynamic discrete-time nonlinear system using genetic algorithm
Published 2002“…The development of a multivariable system identification model for dynamic discrete-time nonlinear system using genetic algorithm was discussed and analysed. …”
Get full text
Get full text
Conference or Workshop Item -
9
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
10
Identification of non-linear dynamic systems using fuzzy system with constrained membership functions
Published 2004“…This study deals with the use of the rule-based fuzzy system for the identification of non-linear dynamic systems. …”
Get full text
Get full text
Get full text
Thesis -
11
Identification of continuous-time hammerstein system using sine cosine algorithm
Published 2019“…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Modified multi-verse optimizer for nonlinear system identification of a double pendulum overhead crane
Published 2021“…This paper presents the identification of double pendulum overhead crane (DPOC) plant based on the hybrid Multi-Verse Optimizer with Sine Cosine Algorithm (HMVOSCA) using the continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
14
Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm
Published 2021“…This paper presents the identification of the Thermoelectric Cooler (TEC) plant using a novel metaheuristic called hybrid Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based continuous-time Hammerstein model. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Algorithm for rapid identification of flavonoids classes
Published 2017“…The study concluded that FTIR coupled with PCA analysis can be used as a molecular fingerprint for rapid identification of flavonoids.…”
Get full text
Get full text
Get full text
Get full text
Article -
16
Identification algorithms of flexible structure using neural networks
Published 2006“…The finite duration step input is applied to simulation algorithm of the plate. Finally a comparative performance of the approaches used is presented and discussed.…”
Get full text
Get full text
Conference or Workshop Item -
17
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
18
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
19
An Algorithm for Summarizing Strategies Identification
Published 2008Get full text
Get full text
Get full text
Article -
20
Development of efficient iris identification algorithm using wavelet packets for smartphone application
Published 2017“…Results showed that the accuracy of the proposed algorithm is 100% identification rate.…”
Get full text
Get full text
Get full text
Get full text
Article
