Search Results - (( using function method algorithm ) OR ( _ verification method algorithm ))
Search alternatives:
- verification method »
- method algorithm »
- function method »
- using function »
- _ verification »
-
1
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…The multi-bases number representation is also applied to construct another new elliptic curve joint-scalar multiplication algorithm, called the joint-multi base algorithm. This method computes two scalar multiplications simultaneously using multi bases in the chain. …”
Get full text
Get full text
Thesis -
2
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…The thesis was set to three objectives as follows; to develop a new augmentation algorithm of Simplex method from the existed augmentation studies; to integrate the superiorities of the QSM and BLSA algorithms that can enhance computational performance; to compare the performance of the new augmentation algorithm with the conventional Simplex, QSM and BLSA in reducing iteration number. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…It will include the coding of python programming coding and calculation of proposed method. The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
4
Image Steganography Using Hash Function And Compression
Published 2023“…Prior to and following the embedding of a message image, the cover image is hashed using the hash function. The hash function will be used in the stego image, and the result will be kept in the host image for additional verification throughout the extraction process. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Application of Lamport Digital Signature Scheme into the station-to-station protocol / Md Nizam Udin … [et al.]
Published 2022“…The results from the study are STS protocol algorithms that provide a verification scheme using the Lamport Digital Signature Scheme. …”
Get full text
Get full text
Get full text
Article -
6
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Passwords are frequently used to control access to restricted functions. …”
Get full text
Get full text
Thesis -
7
Development Of Analytical Solution For Thermo-Mechanical Stresses Of Multilayered Pressure Vessel Based On Recursive Algorithm
Published 2022“…Recent studies showed that analytical solution based on recursive algorithm can be used to obtain thermo-mechanical stresses of multilayered structure efficiently. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…This research also proposes the improvement of mean time to failure (MTTF) by using the new model checking method. At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
Get full text
Get full text
Get full text
Technical Report -
9
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
Get full text
Get full text
Research Report -
10
Partial encryption of compressed images employing FPGA
Published 2005“…The breadth-first traversal linear lossless quadtree decomposition method is used for the partial compression and RSA is used for the encryption. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
A comparative study of vibrational response based impact force localization and quantification using different types of neural networks / Wang Yanru
Published 2018“…It may be ore accurate than MLPwhen there are multiple outputs. In addition, ANFIS uses hybrid learning algorithm. It is mixed with least mean square and gradient descent method, which cause many advantages, such as much better learning ability and less computational time. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…We classify the cluster group that exceeds the stopping rule as potential outliers. Model verification of all method and model proposed in this study are examined using the simulation study. …”
Get full text
Get full text
Thesis -
14
User authentication using neural network in smart home
Published 2009“…In this project, a neural network is trained to store the passwords and replace verification table. This method is useful in solving security problems that happened in some authentication system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
15
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…Dynamic characterisations of one-dimensional flexible beam and two-dimensional flexible plate structures are presented and simulation algorithms characterising the behaviour of each structure is developed using finite difference methods. …”
Get full text
Get full text
Get full text
Thesis -
16
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. Likewise, the widely used standard verification simulation tool AVISPA is used to verify that the scheme is secure against passive and active attacks. …”
Get full text
Get full text
Thesis -
17
A fictitious reference iterative tuning method for buck converter-powered DC motor control system
Published 2019“…Simulation analyses using Matlab Software have been conducted for results validation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Case driven TLC model checker analysis in energy scenario
Published 2023“…Addressing current situation in Ukraine, an energy domain is among the topical spheres, where safety critical business processes take place. To foster the functional safety of corresponding program-algorithmic solutions, the model checking techniques and related tools are applied to the formal specifications of named solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…The verification of the proposed approach is made with current state-of-the-art algorithms. …”
Get full text
Get full text
Thesis -
20
Application of Neural Network in User Authentication for Smart Home System
Published 2009“…In this paper, a neural network is trained to store the passwords instead of using verification table. This method is useful in solving security problems that happened in some authentication system. …”
Get full text
Get full text
Get full text
Article
