Search Results - (( using function based algorithm ) OR ( based verification method algorithm ))

Refine Results
  1. 1

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development Of Analytical Solution For Thermo-Mechanical Stresses Of Multilayered Pressure Vessel Based On Recursive Algorithm by Sim, Lih Chi

    Published 2022
    “…Recent studies showed that analytical solution based on recursive algorithm can be used to obtain thermo-mechanical stresses of multilayered structure efficiently. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers by Alwi @ Suhaimi, Saifulza, Salleh, Mohd Rizal, Jaafar, Hazriq Izzuan, Ab Ghani, Mohd Ruddin, Md Fauadi, Muhammad Hafidz Fazli

    Published 2019
    “…This research also proposes the improvement of mean time to failure (MTTF) by using the new model checking method. At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  4. 4

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…Finally, a unique fingerprint based key is constructed using a user's fingerprint image and the key used to access and retrieve the private key. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…It will include the coding of python programming coding and calculation of proposed method. The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
    Get full text
    Get full text
    Student Project
  6. 6
  7. 7

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…The second controller design strategy is based on a cost function optimization using GAS. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    User authentication using neural network in smart home by Jee,, Tze Ling

    Published 2009
    “…Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A fictitious reference iterative tuning method for buck converter-powered DC motor control system by Mohd Syakirin, Ramli, Sian, Seet Meng, Mohd Naharudin, Salim, Hamzah, Ahmad

    Published 2019
    “…This paper presents a model-free optimization algorithm for a PID controller based on Fictitious Reference Iterative Tuning and Simulated Kalman Filter. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Application of Neural Network in User Authentication for Smart Home System by Joseph, A., David Bong, Boon Liang, Dayang Azra, Awang Mat

    Published 2009
    “…In this paper, a neural network is trained to store the passwords instead of using verification table. This method is useful in solving security problems that happened in some authentication system. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17

    Dynamic modelling and control of a flexible manipulator by Mohamed, Zaharuddin

    Published 2003
    “…The command shaping techniques are designed based on the parameters of the system obtained using the unshaped bang-bang torque input. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Security system using biometric technology: Design and implementation of voice recognition system (VRS) by A. Rashid, Rozeha, Mahalin, Nur Hija, Sarijari, Mohd. Adib, Abdul Aziz, Ahmad Aizuddin

    Published 2008
    “…Verification algorithm is developed using MATLAB (SIMULINK) function blocks which is capable of authenticating a person's identity by his or her voice pattern. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item