Search Results - (( using verification using algorithm ) OR ( using function methods algorithm ))

Refine Results
  1. 1

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Miller’s algorithm for computing the Tate pairing, originally used the binary chains with corresponding point doubling operation in evaluating the rational function. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…It will include the coding of python programming coding and calculation of proposed method. The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Image Steganography Using Hash Function And Compression by Ahmad Sulaiman, Zurkifli

    Published 2023
    “…Prior to and following the embedding of a message image, the cover image is hashed using the hash function. The hash function will be used in the stego image, and the result will be kept in the host image for additional verification throughout the extraction process. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4
  5. 5

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…The LP’s application is need to be further computed with a technique and Simplex algorithm is the one that commonly used. The Simplex algorithm has three stages of computation namely initialization, iterative calculation and termination. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Development Of Analytical Solution For Thermo-Mechanical Stresses Of Multilayered Pressure Vessel Based On Recursive Algorithm by Sim, Lih Chi

    Published 2022
    “…Recent studies showed that analytical solution based on recursive algorithm can be used to obtain thermo-mechanical stresses of multilayered structure efficiently. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results by Fouziah Md Yassin, Ag Asri Ag Ibrahim, Zaturrawiah Ali Omar, Saturi Baco

    Published 2015
    “…The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
    Get full text
    Get full text
    Research Report
  8. 8

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…Passwords are frequently used to control access to restricted functions. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Partial encryption of compressed images employing FPGA by Reaz, Mamun Bin Ibne Ibne, Ibrahimy, Muhammad Ibn, Mohd-Yasin, F., Tan, SiewLin, Tan, HungKhoon

    Published 2005
    “…A secure encryption algorithm is then used to encrypt only the crucial parts, which are considerably smaller than the original image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…Dynamic characterisations of one-dimensional flexible beam and two-dimensional flexible plate structures are presented and simulation algorithms characterising the behaviour of each structure is developed using finite difference methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A comparative study of vibrational response based impact force localization and quantification using different types of neural networks / Wang Yanru by Wang, Yanru

    Published 2018
    “…It may be ore accurate than MLPwhen there are multiple outputs. In addition, ANFIS uses hybrid learning algorithm. It is mixed with least mean square and gradient descent method, which cause many advantages, such as much better learning ability and less computational time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…We classify the cluster group that exceeds the stopping rule as potential outliers. Model verification of all method and model proposed in this study are examined using the simulation study. …”
    Get full text
    Get full text
    Thesis
  13. 13

    User authentication using neural network in smart home by Jee,, Tze Ling

    Published 2009
    “…In this project, a neural network is trained to store the passwords and replace verification table. This method is useful in solving security problems that happened in some authentication system. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  14. 14

    A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers by Alwi @ Suhaimi, Saifulza, Salleh, Mohd Rizal, Jaafar, Hazriq Izzuan, Ab Ghani, Mohd Ruddin, Md Fauadi, Muhammad Hafidz Fazli

    Published 2019
    “…This research also proposes the improvement of mean time to failure (MTTF) by using the new model checking method. At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  15. 15
  16. 16

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. Likewise, the widely used standard verification simulation tool AVISPA is used to verify that the scheme is secure against passive and active attacks. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Application of Neural Network in User Authentication for Smart Home System by Joseph, A., David Bong, Boon Liang, Dayang Azra, Awang Mat

    Published 2009
    “…In this paper, a neural network is trained to store the passwords instead of using verification table. This method is useful in solving security problems that happened in some authentication system. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Case driven TLC model checker analysis in energy scenario by Shkarupylo, Vadym, Blinov, Ihor V., Dusheba, Valentyna, Alsayaydeh, Jamil Abedalrahim Jamil

    Published 2023
    “…Addressing current situation in Ukraine, an energy domain is among the topical spheres, where safety critical business processes take place. To foster the functional safety of corresponding program-algorithmic solutions, the model checking techniques and related tools are applied to the formal specifications of named solutions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Implementation of the Merkle-Hellman knapsack cryptosystem into station-to-station protocol / Nurzhulaika Yahya, Noor Izzah Agil and Nur ‘Afini Nordin by Yahya, Nurzhulaika, Agil, Noor Izzah, Nordin, Nur ‘Afini

    Published 2023
    “…The Merkle-Hellman Knapsack Encryption Cryptosystem is the first widely used public key encryption algorithm. Martin Hellman and Ralph Merkle came up with the idea in 1978. …”
    Get full text
    Get full text
    Student Project
  20. 20