Search Results - (( using solution using algorithm ) OR ( using verification using algorithm ))

Refine Results
  1. 1

    Development Of Analytical Solution For Thermo-Mechanical Stresses Of Multilayered Pressure Vessel Based On Recursive Algorithm by Sim, Lih Chi

    Published 2022
    “…Recent studies showed that analytical solution based on recursive algorithm can be used to obtain thermo-mechanical stresses of multilayered structure efficiently. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system by Jasni, Jasronita

    Published 2010
    “…Furthermore, the real data with 293 buses and 595 lines is used as a practical system for verification of the new algorithms The results show that these new algorithms are able to eliminate the convergence problem faced by the existing CPF algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Continuation power flow for voltage stability assessment / Mohd Zamri Laton by Laton, Mohd Zamri

    Published 2006
    “…A small test system is used for the implementation of this technique and another medium test system is also used for verification of the program used.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Simulation of the flow pattern around spur dykes using FLUENTS by Othman A. Karimb, K.H.M. Ali

    Published 1999
    “…Extensive testing procedures have been implemented to ensure that the equations and solution algorithms used by FLUENT would provide an accurate simulation of flow. …”
    Get full text
    Get full text
    Article
  6. 6

    A Dual Recurrent Neural Network-based Hybrid Approach for Solving Convex Quadratic Bi-Level Programming Problem by WATADA, J., ROY, A., LI, J., WANG, B., WANG, S.

    Published 2020
    “…The accuracy and efficiency of the proposed method have been found better than the existing and widely used approaches, while doing experimental verification using four well-known examples used in prior works. …”
    Get full text
    Get full text
    Article
  7. 7

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A Location-Based Fraud Detection in Shipping Industry Using Machine Learning Comparison Techniques by Subramaniam G.A.L., Mahmoud M.A., Abdulwahid S.N., Gunasekaran S.S.

    Published 2025
    “…A study reviewed existing fraud detectionFraud detection models and identified the most effective algorithm for the shipping industry. Using RapidMiner, various algorithms were tested. …”
    Book chapter
  9. 9

    Load flow study comparison between Newton Raphson load flow method and fast decouple load flow method / Mohd Haizilan Alias by Alias, Mohd Haizilan

    Published 2007
    “…A small test system is used for the implementation of this technique and another medium test system is also used for verification of the program used.…”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…The “ensemble” model selected here to achieve better predictive performance, is used to predict future market price. The proposed approachoutperforms existing available meta-heuristic algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review by Nuh, Jamal Abdullahi, Koh, Tieng Wei, Baharom, Salmi, Osman, Mohd Hafeez, Kew, Si Na

    Published 2021
    “…Many recent studies have shown that various multi-objective evolutionary algorithms have been widely applied in the field of search-based software engineering (SBSE) for optimal solutions. …”
    Get full text
    Get full text
    Article
  13. 13

    Simulation of single and dual layered rapid pressure swing adsorption by Lai, Yin Ling

    Published 2013
    “…Higher pressure drop across the bed is induced when particles of smaller pressure drop are used in the first layer and particles of larger pressure drop are used in the second layer, hence leading to better separation. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Bundle Sorting Mobile Application by Zulkifley, Muhammad Dzofir Hafiz

    Published 2020
    “…The worker or user just used the camera that has an image processing algorithm to do the sorting. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    A Hybrid Evaluation Metric for Optimizing Classifier by Hossin, M., Sulaiman, M.N, Mustapha, A., Mustapha, N., Rahmat, R.W

    Published 2011
    “…The accuracy metric has been widely used for discriminating and selecting an optimal solution in constructing an optimized classifier. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  17. 17

    A hybrid evaluation metric for optimizing classifier by Hossin, Mohammad, Sulaiman, Md. Nasir, Mustapha, Aida, Mustapha, Norwati, O. K. Rahmat, Rahmita Wirza

    Published 2011
    “…The accuracy metric has been widely used for discriminating and selecting an optimal solution in constructing an optimized classifier. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A secure, anonymous and verifiable E-Voting system by Ooi, Elynn

    Published 2020
    “…Therefore, this paper studies the disadvantages of the existing voting system by looking through the method used by the society. Furthermore, this paper also proposes a more secure voting system which uses some encryption and hashing algorithms in order to solve the negative impacts of the existing voting systems. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The formal verification is performed using BAN logic to prove the security and mutual authentications. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Case driven TLC model checker analysis in energy scenario by Shkarupylo, Vadym, Blinov, Ihor V., Dusheba, Valentyna, Alsayaydeh, Jamil Abedalrahim Jamil

    Published 2023
    “…To foster the functional safety of corresponding program-algorithmic solutions, the model checking techniques and related tools are applied to the formal specifications of named solutions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item