Search Results - (( basic model verification algorithm ) OR ( java implication tree algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1
  2. 2

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A PLC-based Hybrid Fuzzy PID Controller for PWM-driven Variable Speed Drive by ARROFIQ, MUHAMMAD

    Published 2010
    “…A simulation model in MA TLAB/Simulink is developed using system identification technique to perform verification of the PLCbased intelligent controller of the PWM-driven VVVF algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development and Application of a Finite Element Distributed Rainfall Runoff Simulation Model by Huang, Yuk Feng

    Published 2000
    “…A laboratory rainfall runoff physical model was set up for observation data in order to test the numerical model. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Comparison of Landsat 8, Sentinel-2 and spectral indices combinations for Google Earth Engine-based land use mapping in the Johor River Basin, Malaysia by Ju, Zeng, Tan, Mou Leong, Narimah Samat, Chang, Chun Kiat

    Published 2021
    “…The Random Forest (RF) algorithm was used to classify the land use land cover (LULC) with 222 training samples and 78 verification samples obtained through the Google Earth Pro higher resolution satellite images and field samplings. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Digital forensic investigation reduction model (DIFReM) for Windows 10 OS by Shayau, Yazid Haruna

    Published 2018
    “…We propose a data reduction model (DIFReM) and tool which will not only help the investigator in identifying modified system files but also the ability to detect files inserted into system directories and also be able to verify integrity using hashing. …”
    Get full text
    Get full text
    Thesis