Search Results - (( using function a algorithm ) OR ( using verification using algorithm ))
Search alternatives:
- using verification »
- verification using »
- using algorithm »
- using function »
- a algorithm »
- function a »
-
1
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Data integrity must be ensured before and after the data transmission. Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. …”
Get full text
Get full text
Thesis -
2
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
5
Image Steganography Using Hash Function And Compression
Published 2023“…Before being embedded into a cover image, the message image will be compressed using lossy compression algorithms to reduce the size of the image. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Application of Lamport Digital Signature Scheme into the station-to-station protocol / Md Nizam Udin … [et al.]
Published 2022“…The results from the study are STS protocol algorithms that provide a verification scheme using the Lamport Digital Signature Scheme. …”
Get full text
Get full text
Get full text
Article -
7
Design of a floating point unit for 32-bit 5 stage pipeline processor
Published 2020“…Verification will be made to determine functionality correctness of FPU. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
9
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
10
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…This study attempts to solve this problem by recognizing the part model’s features via its geometrical based and produce sub-delta volumes that can later be used to generate manufacturing feature-based data for CAM in a single system via generations of algorithm through open source 3D CAD modeller. …”
Get full text
Get full text
Thesis -
11
A Test Vector Minimization Algorithm Based On Delta Debugging For Post-Silicon Validation Of Pcie Rootport
Published 2017“…The proposed methodology is inspired by the Delta Debugging algorithm which is has been used in automated software debugging but not in post-silicon hardware debugging. …”
Get full text
Get full text
Thesis -
12
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…The LP’s application is need to be further computed with a technique and Simplex algorithm is the one that commonly used. …”
Get full text
Get full text
Get full text
Thesis -
13
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…The methodology of this research are involving design specification, high level design using C++, RTL level description using Verilog, functional verification and logic synthesis using two different technology library. …”
Get full text
Get full text
Research Report -
14
A new hough transform on face detection and recognition using integrated histograms
Published 2015“…Hough Transform (HT) is one of the useful algorithms in pattern recognition. It is popularly used to detect straight lines, circles and curves in images. …”
Get full text
Get full text
Article -
15
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The primary theoretical contribution is the TCP framework, which is applied in the software testing industry. TCP factors and a weighted fitness function are also used for test case optimisation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…Classification rules were generated from training feature vectors set, and a modified form of the standard voter classification algorithm, that use the rough sets generated rules, was applied. …”
Get full text
Get full text
Thesis -
17
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The first controller design is formulated so as to allow on-line modeling, controller design and implementation and thus, yield a self-tuning control algorithm. Performance of the AVC algorithm is assessed based on parametric design techniques, using RLS and GAS, and non-parametric design techniques, using MLP-NN and ANFIS in the suppression of vibration of the flexible structures. …”
Get full text
Get full text
Get full text
Thesis -
18
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. The MATLAB simulation with Fingerprint Verification Competition (FVC) 2002 database was used to measure the encryption results, secret key spaces, key sensitivity, histogram, correlation, differential, entropy information, matching/recognition analysis, and revocability. …”
Get full text
Get full text
Thesis -
19
Partial encryption of compressed images employing FPGA
Published 2005“…A secure encryption algorithm is then used to encrypt only the crucial parts, which are considerably smaller than the original image. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis
