Search Results - (( program implementation using algorithm ) OR ( using verification using algorithm ))
Search alternatives:
- program implementation »
- implementation using »
- using verification »
- verification using »
- using algorithm »
-
1
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
2
-
3
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
4
Continuation power flow for voltage stability assessment / Mohd Zamri Laton
Published 2006“…A small test system is used for the implementation of this technique and another medium test system is also used for verification of the program used.…”
Get full text
Get full text
Thesis -
5
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code
Published 2018“…The iterative reconstruction algorithms is used to generate and calculate the 2600 coordinates of calibration map from the number of photon counts from the ten NaI scintillation detectors. …”
Get full text
Get full text
Get full text
Article -
7
Back end process yield improvement by verification of seeder bulk erase quality for 3.5" reowrk hard disk drive
Published 2014“…The focus of this project is to improve the yield of filler back end process by implementation of T AA profiling gating algorithm in the HDS seeder software at STW stations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Load flow study comparison between Newton Raphson load flow method and fast decouple load flow method / Mohd Haizilan Alias
Published 2007“…A small test system is used for the implementation of this technique and another medium test system is also used for verification of the program used.…”
Get full text
Get full text
Thesis -
9
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…A novel of combination direct and indirect (CoDId) MPPT algorithm is implemented for solving mismatch losses from existing PV system by employing the implementation of system identification approach. …”
Get full text
Get full text
Thesis -
10
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…The program is uploaded in the Raspberry Pi by using C++ language and OpenCV image processing library. …”
Get full text
Get full text
Monograph -
11
Case driven TLC model checker analysis in energy scenario
Published 2023“…To foster the functional safety of corresponding program-algorithmic solutions, the model checking techniques and related tools are applied to the formal specifications of named solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The formal verification is performed using BAN logic to prove the security and mutual authentications. …”
Get full text
Get full text
Thesis -
14
A study on obstacle detection for IoT based automated guided vehicle (AGV)
Published 2022“…In order to improve obstacle detection in the AGV prototype, Kalman Filtering (KF) algorithm is used in the signal filtering for the HC-SR04 Ultrasonic Sensor data acquisition. …”
Get full text
Get full text
Get full text
Article -
15
Digital Signal Processor (DSP) Design Using Very Long Instruction Word (VLIW) Architecture
Published 2001“…However, the pDSP chip has better ability to perform number crunching algorithms simultaneously. The objective of this research is to design and implement a general-purpose programmable DSP (Digital Signal Processor) core. …”
Get full text
Get full text
Thesis -
16
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
17
-
18
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
E-voting system with physical verification using OTP algorithm / Badrul Amin Mohd Kassim
Published 2021Get full text
Get full text
Student Project
