Search Results - (( using solution based algorithm ) OR ( using verification using algorithm ))
Search alternatives:
- using verification »
- verification using »
- using algorithm »
- using solution »
- solution based »
-
1
Development Of Analytical Solution For Thermo-Mechanical Stresses Of Multilayered Pressure Vessel Based On Recursive Algorithm
Published 2022“…Recent studies showed that analytical solution based on recursive algorithm can be used to obtain thermo-mechanical stresses of multilayered structure efficiently. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
3
Continuation power flow for voltage stability assessment / Mohd Zamri Laton
Published 2006“…The continuation power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
Get full text
Get full text
Thesis -
4
A Dual Recurrent Neural Network-based Hybrid Approach for Solving Convex Quadratic Bi-Level Programming Problem
Published 2020“…The accuracy and efficiency of the proposed method have been found better than the existing and widely used approaches, while doing experimental verification using four well-known examples used in prior works. …”
Get full text
Get full text
Article -
5
Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system
Published 2010“…Furthermore, the real data with 293 buses and 595 lines is used as a practical system for verification of the new algorithms The results show that these new algorithms are able to eliminate the convergence problem faced by the existing CPF algorithm. …”
Get full text
Get full text
Thesis -
6
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The modal frequencies of the tower are evaluated under various conditions of damage in concrete and connection in different parts of the tower by using finite element simulation. The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
7
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
Published 2021“…Many recent studies have shown that various multi-objective evolutionary algorithms have been widely applied in the field of search-based software engineering (SBSE) for optimal solutions. …”
Get full text
Get full text
Article -
8
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…The algorithm complexity analysis was used to measure the execution time in the worst case. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A Location-Based Fraud Detection in Shipping Industry Using Machine Learning Comparison Techniques
Published 2025“…A study reviewed existing fraud detectionFraud detection models and identified the most effective algorithm for the shipping industry. Using RapidMiner, various algorithms were tested. …”
Book chapter -
10
Load flow study comparison between Newton Raphson load flow method and fast decouple load flow method / Mohd Haizilan Alias
Published 2007“…The method of power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
Get full text
Get full text
Thesis -
11
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…The “ensemble” model selected here to achieve better predictive performance, is used to predict future market price. The proposed approachoutperforms existing available meta-heuristic algorithms. …”
Get full text
Get full text
Thesis -
12
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
13
Secure lightweight client for cloud-based E-Health Model
Published 2023“…Thirdly, an authorization algorithm named federated proxy implements for fine-grained access control based on CP-ABE (FPI-CP-ABE) is proposed. …”
Get full text
Get full text
Get full text
Thesis -
14
Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad
Published 2019“…Vehicular clustering is a solution to minimize the use of LTE and the added cost. …”
Get full text
Get full text
Get full text
Thesis -
15
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
16
Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption
Published 2013“…The optimal design is obtained by using the constrained nonlinear multivariable optimization algorithm provided by MATLAB. …”
Get full text
Get full text
Conference or Workshop Item -
17
Oral Dictionary
Published 2006“…The application is using the text-to-speech (TTS) technology which is different from other commercial dictionary software who use to record each sample of word. …”
Get full text
Get full text
Final Year Project -
18
Bottleneck-based heuristic for permutation flowshop scheduling
Published 2017“…The newly heuristic is developed by introducing the bottleneck-based concept that was applied at the beginning of initial solution determination. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A PLC-based Hybrid Fuzzy PID Controller for PWM-driven Variable Speed Drive
Published 2010“…A simulation model in MA TLAB/Simulink is developed using system identification technique to perform verification of the PLCbased intelligent controller of the PWM-driven VVVF algorithm. …”
Get full text
Get full text
Thesis -
20
A headway and order scheme based mixed integer goal programming model for railway rescheduling / Zuraida Alwadood
Published 2017“…The model is solved by means of preemptive goal programming technique, using MATLAB r2014a, which automatically generates the optimal solution to the problem. …”
Get full text
Get full text
Thesis
