Search Results - (( using function a algorithm ) OR ( based verification using algorithm ))
Search alternatives:
- based verification »
- verification using »
- using algorithm »
- using function »
- a algorithm »
- function a »
-
1
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
2
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…This study attempts to solve this problem by recognizing the part model’s features via its geometrical based and produce sub-delta volumes that can later be used to generate manufacturing feature-based data for CAM in a single system via generations of algorithm through open source 3D CAD modeller. …”
Get full text
Get full text
Thesis -
3
A Test Vector Minimization Algorithm Based On Delta Debugging For Post-Silicon Validation Of Pcie Rootport
Published 2017“…However, manual debugging is still widely used in post-silicon validation and is a major bottleneck in the validation process. …”
Get full text
Get full text
Thesis -
4
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
5
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
Get full text
Get full text
Research Report -
6
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
7
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
8
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The second controller design strategy is based on a cost function optimization using GAS. …”
Get full text
Get full text
Get full text
Thesis -
9
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…A vector quantization model that incorporate rough sets attribute reduction and rules generation with a modified version of the K-means clustering algorithm was developed, implemented and tested as a part of a speech recognition framework, in which the Learning Vector Quantization (LVQ) neural network model was used in the pattern matching stage. …”
Get full text
Get full text
Thesis -
10
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
11
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
Get full text
Get full text
Thesis -
13
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…This research also proposes the improvement of mean time to failure (MTTF) by using the new model checking method. At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
Get full text
Get full text
Get full text
Technical Report -
14
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…A web-based traffic management system was developed using open source software in this study. …”
Get full text
Get full text
Thesis -
15
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
16
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…The verification and simulation report illustrate that the module and improved algorithm has successfully been executed to deliver a report of tracking that is in accordance with the requirements of administering Halal goods. …”
Get full text
Get full text
Thesis -
17
A comparative study of vibrational response based impact force localization and quantification using different types of neural networks / Wang Yanru
Published 2018“…Inaddition, it has similiar architecture with RBFN. MLP & RBFN use gaussian function as activation fuction, but GRNN has one extra special linear layer, where outputs are considered in this layer, thus GRNN's performance in impact force indetification is expected to be good. …”
Get full text
Get full text
Get full text
Thesis -
18
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…Likewise, the widely used standard verification simulation tool AVISPA is used to verify that the scheme is secure against passive and active attacks. …”
Get full text
Get full text
Thesis -
19
User authentication using neural network in smart home
Published 2009“…Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Dynamic modelling of a single link flexible manipulator in vertical motion using swarm and genetic optimisation
Published 2009“…In this research, particle swann optimisation (PSO) and genetic algorithm (GA) are used to model a single-link flexible manipulator. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
