Search Results - (( using solution using algorithm ) OR ( using verification using algorithm ))
Search alternatives:
- using verification »
- verification using »
- using algorithm »
- using solution »
- solution using »
-
1
Development Of Analytical Solution For Thermo-Mechanical Stresses Of Multilayered Pressure Vessel Based On Recursive Algorithm
Published 2022“…Recent studies showed that analytical solution based on recursive algorithm can be used to obtain thermo-mechanical stresses of multilayered structure efficiently. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
3
Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system
Published 2010“…Furthermore, the real data with 293 buses and 595 lines is used as a practical system for verification of the new algorithms The results show that these new algorithms are able to eliminate the convergence problem faced by the existing CPF algorithm. …”
Get full text
Get full text
Thesis -
4
Continuation power flow for voltage stability assessment / Mohd Zamri Laton
Published 2006“…A small test system is used for the implementation of this technique and another medium test system is also used for verification of the program used.…”
Get full text
Get full text
Thesis -
5
Simulation of the flow pattern around spur dykes using FLUENTS
Published 1999“…Extensive testing procedures have been implemented to ensure that the equations and solution algorithms used by FLUENT would provide an accurate simulation of flow. …”
Get full text
Get full text
Article -
6
A Dual Recurrent Neural Network-based Hybrid Approach for Solving Convex Quadratic Bi-Level Programming Problem
Published 2020“…The accuracy and efficiency of the proposed method have been found better than the existing and widely used approaches, while doing experimental verification using four well-known examples used in prior works. …”
Get full text
Get full text
Article -
7
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
8
A Location-Based Fraud Detection in Shipping Industry Using Machine Learning Comparison Techniques
Published 2025“…A study reviewed existing fraud detectionFraud detection models and identified the most effective algorithm for the shipping industry. Using RapidMiner, various algorithms were tested. …”
Book chapter -
9
Load flow study comparison between Newton Raphson load flow method and fast decouple load flow method / Mohd Haizilan Alias
Published 2007“…A small test system is used for the implementation of this technique and another medium test system is also used for verification of the program used.…”
Get full text
Get full text
Thesis -
10
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…The algorithm complexity analysis was used to measure the execution time in the worst case. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
11
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…The “ensemble” model selected here to achieve better predictive performance, is used to predict future market price. The proposed approachoutperforms existing available meta-heuristic algorithms. …”
Get full text
Get full text
Thesis -
12
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
Published 2021“…Many recent studies have shown that various multi-objective evolutionary algorithms have been widely applied in the field of search-based software engineering (SBSE) for optimal solutions. …”
Get full text
Get full text
Article -
13
Simulation of single and dual layered rapid pressure swing adsorption
Published 2013“…Higher pressure drop across the bed is induced when particles of smaller pressure drop are used in the first layer and particles of larger pressure drop are used in the second layer, hence leading to better separation. …”
Get full text
Get full text
Thesis -
14
A New Model of Securing Iris Authentication Using Steganography
Published 2011Get full text
Get full text
Article -
15
Bundle Sorting Mobile Application
Published 2020“…The worker or user just used the camera that has an image processing algorithm to do the sorting. …”
Get full text
Get full text
Final Year Project -
16
A Hybrid Evaluation Metric for Optimizing Classifier
Published 2011“…The accuracy metric has been widely used for discriminating and selecting an optimal solution in constructing an optimized classifier. …”
Get full text
Get full text
Get full text
Proceeding -
17
A hybrid evaluation metric for optimizing classifier
Published 2011“…The accuracy metric has been widely used for discriminating and selecting an optimal solution in constructing an optimized classifier. …”
Get full text
Get full text
Conference or Workshop Item -
18
A secure, anonymous and verifiable E-Voting system
Published 2020“…Therefore, this paper studies the disadvantages of the existing voting system by looking through the method used by the society. Furthermore, this paper also proposes a more secure voting system which uses some encryption and hashing algorithms in order to solve the negative impacts of the existing voting systems. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The formal verification is performed using BAN logic to prove the security and mutual authentications. …”
Get full text
Get full text
Thesis -
20
Case driven TLC model checker analysis in energy scenario
Published 2023“…To foster the functional safety of corresponding program-algorithmic solutions, the model checking techniques and related tools are applied to the formal specifications of named solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
