Search Results - (( using simulation method algorithm ) OR ( software mitigation method algorithm ))
Search alternatives:
- software mitigation »
- simulation method »
- mitigation method »
- method algorithm »
-
1
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems
Published 2012“…The adopted reduced rank technique is based on singular value decomposition algorithm. Equations for reduced rank-joint channel estimation (JCE) are derived and compared against traditional full rank-joint channel estimators: least square (LS) or Steiner, enhanced LS, and minimum mean square error algorithms. …”
Get full text
Get full text
Article -
3
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019Get full text
Get full text
Get full text
Book Chapter -
4
Optimal Maintenance Scheduling for Multi-Component E-Manufacturing System
Published 2009“…Furthermore, it indicates that when the mean time to repairs are longer, this method is more efficient. The results in the simulated testbed indicate that the developed scheduling method using simulation optimization functions properly and can be applied in other cases.…”
Get full text
Get full text
Thesis -
5
Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region
Published 2016“…In this study, rockfall source areas were identified using multi-criteria method based on DEM derivates, terrain type or land use/cover (LULC) and high spatial resolution aerial photo (13cm). …”
Get full text
Get full text
Thesis -
6
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…It allows one single instance of software to serve various clients. Password-based authentication is considered the cheapest and most popular and commonly used methods of computer authentication. …”
text::Thesis -
7
VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS
Published 2012“…In this study, the proposed framework methods are simulated using two propagation models, i.e. two ray ground model and Nakagami model for VANET environment (802.11p). …”
Get full text
Get full text
Thesis -
8
VHF adaptive antenna using a rear defogger
Published 2012“…Downhill simplex method is used as an algorithm to form the adaptive beam for the proposed antenna. …”
Get full text
Get full text
Thesis -
9
Effect of mesh coarseness on slope stability analysis using 2D and 3D finite element method
Published 2024“…However, the stability analyses using Finite Element Method (FEM) have gained significant attention in geotechnical engineering due to their ability to simulate slope behaviour and predict stability accurately by employing mathematical models and computational algorithms. …”
Get full text
Get full text
Get full text
Article -
10
Deep reinforcement learning based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles
Published 2022“…Three state-of-the-art contemporary actor-critic algorithms are used to create an extensive simulation in Unity3D. …”
Get full text
Get full text
Get full text
Article -
11
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
12
Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar
Published 2012“…The simulations will be done using the PSCAD/EMTDC software. …”
Get full text
Get full text
Thesis -
13
Development of new code for optical code division multiple access systems
Published 2011“…Thirdly, a software simulation for SAC OCDMA system with the RD families using a commercial optical system, “OtisystemTM Ver. 7.0” is conducted. …”
Get full text
Thesis -
14
Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System
Published 2008“…From the results revealed by the MIKE11 modeling simulation, there were evidences that SMART was useful for flood mitigation of Klang River Basin. …”
Get full text
Get full text
Thesis -
15
Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu
Published 2018“…The CMV can be bounded within one-fourth of the dc-link voltage of a three-phase four-leg inverter using the proposed NSV-MPC technique. MATLAB/Simulink software environment is used for the simulation and the LabVIEW Field programmable gate array (FPGA) rapid prototyping controller is used to validate the proposed control scheme. …”
Get full text
Get full text
Get full text
Thesis -
16
1D Multigrid Solver For Finite Element Method
Published 2022“…The new algorithm also has been tested using time simulation. …”
Get full text
Get full text
Monograph -
17
Efficient Sequential and Parallel Routing Algorithms in Optical Multistage Interconnection Network
Published 2005“…This routing problem is an NPhard problem. Many algorithms are designed by many researchers to perform this routing such as window method, sequential algorithm, degree-descending algorithm, simulated annealing algorithm, genetic algorithm and ant colony algorithm.This thesis explores two approaches, sequential and parallel approaches. …”
Get full text
Get full text
Thesis -
18
Simulation Of Path Optimisation Algorithms
Published 2017“…Likewise, when comparing between Bidirectional Searching with Replanning and Unidirectional Searching with Replanning, a decrease of 41.08%, 25.57% and 14.41% on algorithm total time can be seen. Thus, in this final year project, the optimum algorithm to use is A* algorithm with Bidirectional Searching method and Replanning method included during the searching process. …”
Get full text
Get full text
Monograph -
19
The use of a partially simulated exothermic reactor to test nonlinear algorithms
Published 2000“…These methods have been found to be useful in dealing with difficult-to-control nonlinear systems, especially in simulated systems. …”
Get full text
Get full text
Article -
20
Power Delivery Network Modeling And Simulation By Using Delaunay-Voronoi Triangulation And The Latency Insertion Method
Published 2018“…The research is focused into the analysis of PDN by modeling and simulation of the power plane. In the project, power plane is modeled using Delaunay-Voronoi algorithm and for simulation, a fast transient simulation algorithm which is latency insertion method (LIM) is applied. …”
Get full text
Get full text
Monograph
