Search Results - (( using function using algorithm ) OR ( using verification using algorithm ))
Search alternatives:
- using verification »
- verification using »
- using algorithm »
- using function »
-
1
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Functionality verification is done using the test case provided by National Institute Standards and Technology (NIST). …”
Get full text
Get full text
Thesis -
2
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Development of efficient iris identification algorithm using wavelet packets for smartphone application
Published 2017“…Nowadays, iris recognition is widely used for personal identification and verification based on biometrical technology, especially in the smartphone arena. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
6
Image Steganography Using Hash Function And Compression
Published 2023“…Prior to and following the embedding of a message image, the cover image is hashed using the hash function. The hash function will be used in the stego image, and the result will be kept in the host image for additional verification throughout the extraction process. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
8
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
9
Application of Lamport Digital Signature Scheme into the station-to-station protocol / Md Nizam Udin … [et al.]
Published 2022“…The results from the study are STS protocol algorithms that provide a verification scheme using the Lamport Digital Signature Scheme. …”
Get full text
Get full text
Get full text
Article -
10
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…Errors of the overall delta volume (ΔODV) were calculated and verification of the proposed PMC is done. Furthermore, to minimize unit production cost, machining parameters including cutting speed (CS), feed rate (f) and depth of cut (d) were optimized for regular form surfaces by using firefly algorithm (FA). …”
Get full text
Get full text
Thesis -
11
Design of a floating point unit for 32-bit 5 stage pipeline processor
Published 2020“…Verification will be made to determine functionality correctness of FPU. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…The methodology of this research are involving design specification, high level design using C++, RTL level description using Verilog, functional verification and logic synthesis using two different technology library. …”
Get full text
Get full text
Research Report -
13
Speech emotion verification system (SEVS) based on MFCC for real time applications
Published 2008“…Since features extracted using the MFCC simulates the function of the human cochlea, neural network (NN) and fuzzy neural network algorithm namely; Multi Layer Perceptron (MLP), Adaptive Network-based Fuzzy Inference System (ANFIS) and Generic Selforganizing Fuzzy Neural Network (GenSoFNN) were used to verify the different emotions. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Development Of Analytical Solution For Thermo-Mechanical Stresses Of Multilayered Pressure Vessel Based On Recursive Algorithm
Published 2022“…Recent studies showed that analytical solution based on recursive algorithm can be used to obtain thermo-mechanical stresses of multilayered structure efficiently. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
A Test Vector Minimization Algorithm Based On Delta Debugging For Post-Silicon Validation Of Pcie Rootport
Published 2017“…The proposed methodology is inspired by the Delta Debugging algorithm which is has been used in automated software debugging but not in post-silicon hardware debugging. …”
Get full text
Get full text
Thesis -
16
A new hough transform on face detection and recognition using integrated histograms
Published 2015“…Hough Transform (HT) is one of the useful algorithms in pattern recognition. It is popularly used to detect straight lines, circles and curves in images. …”
Get full text
Get full text
Article -
17
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…Classification rules were generated from training feature vectors set, and a modified form of the standard voter classification algorithm, that use the rough sets generated rules, was applied. …”
Get full text
Get full text
Thesis -
18
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The first controller design is formulated so as to allow on-line modeling, controller design and implementation and thus, yield a self-tuning control algorithm. Performance of the AVC algorithm is assessed based on parametric design techniques, using RLS and GAS, and non-parametric design techniques, using MLP-NN and ANFIS in the suppression of vibration of the flexible structures. …”
Get full text
Get full text
Get full text
Thesis -
19
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…TCP factors and a weighted fitness function are also used for test case optimisation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. The MATLAB simulation with Fingerprint Verification Competition (FVC) 2002 database was used to measure the encryption results, secret key spaces, key sensitivity, histogram, correlation, differential, entropy information, matching/recognition analysis, and revocability. …”
Get full text
Get full text
Thesis
