Search Results - (( developing implementation function algorithm ) OR ( data verification using algorithm ))
Search alternatives:
- developing implementation »
- implementation function »
- function algorithm »
- verification using »
- data verification »
- using algorithm »
-
1
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
2
Design of a floating point unit for 32-bit 5 stage pipeline processor
Published 2020“…The development project will start by studying the algorithm of addition on floating point numbers. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
4
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…In addition to the Arabic speech data that used in the original experiments, for both speaker dependant and speaker independent tests, more verification experiments were conducted using the TI20 speech data. …”
Get full text
Get full text
Thesis -
5
-
6
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…A comparison of performance and result of the geofence technique and Family Locator application, developed by Sygic, was made. A user acceptance test has been implemented and most of the respondents agreed that this module will benefit the Halal logistic provider in providing data on real time traceability. …”
Get full text
Get full text
Thesis -
7
Oral Dictionary
Published 2006“…Since the output speed is critical, binary search tree algorithm is chosen as best data structure to be implemented in this application to improve the searching time performance. …”
Get full text
Get full text
Final Year Project -
8
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
9
Development of finite element model for soil-structure interaction
Published 2014“…In order to develop an efficient ANN system, the required algorithm is built through trial and error procedure and then through this process feed-forward network with back-propagation training function is implemented. …”
Get full text
Get full text
Thesis -
10
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
Get full text
Get full text
Thesis -
11
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
13
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
14
Signature verification system using support vector machine
Published 2009“…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
Get full text
Get full text
Conference or Workshop Item -
15
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
Get full text
Get full text
Thesis -
16
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
Get full text
Get full text
Get full text
Article -
17
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2005“…Verifications of the calibrated models were done using the data set of the following year. …”
Get full text
Get full text
Article -
18
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article -
19
Dose verification procedures in radiotherapy
Published 1999Get full text
Get full text
Conference or Workshop Item -
20
Implementation of Color Filtering on FPGA
Published 2007“…Verilog HDL is chosen as the hardware programming language for this system and its compiled using Quartus II program. The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
Get full text
Get full text
Conference or Workshop Item
