Search Results - (( verification implementation during algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- verification implementation »
- implementation during »
- implication based »
- during algorithm »
- java implication »
-
1
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
2
-
3
Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site
Published 2018“…During the experimentation, accurate methane gas concentration measurements at landfill sites were obtained using the algorithm for autonomous flight, with the implementation of optimal quadcopter flight parameters and gas sensor mounting arrangements. …”
Get full text
Get full text
Thesis -
4
Bundle Sorting Mobile Application
Published 2020“…There are many advantages when the apparel industry implemented image processing during sorting the garments product to obtain the accurate quantity in the production line. …”
Get full text
Get full text
Final Year Project -
5
-
6
A secure, anonymous and verifiable E-Voting system
Published 2020“…The problem being emphasized in this project is regarding the security, anonymity and verification issues in an E-Voting System. These issues are serious security threat during the election process as it may affect the accuracy and reliability of the election result. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…A novel of combination direct and indirect (CoDId) MPPT algorithm is implemented for solving mismatch losses from existing PV system by employing the implementation of system identification approach. …”
Get full text
Get full text
Thesis -
8
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The frequency before and after damage was set as input training data, whereas the damage types and locations are set as output data (damage index). The verification results indicate that all the structural defects were predicted with high accuracy by the developed hybrid algorithm in cases of healthy and damaged structures. …”
Get full text
Get full text
Thesis -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Soft redundant instrument for metering station in gas transportation system
Published 2015“…Based on this model, the ANN prediction model is able to reconstruct the unreliable data during faulty instrument. © 2015 IEEE.…”
Get full text
Get full text
Conference or Workshop Item -
11
Soft redundant instrument for metering station in gas transportation system
Published 2015“…Based on this model, the ANN prediction model is able to reconstruct the unreliable data during faulty instrument. © 2015 IEEE.…”
Get full text
Get full text
Conference or Workshop Item -
12
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…This study presents a merged traceability module of GPS tracking system technology with geofence algorithm, entitled the Halal tracer. The significance of Halal tracer traceability module is that it mainly benefits in providing automatic detection on the spatial activity undergone during the shipment process of the Halal goods. …”
Get full text
Get full text
Thesis -
13
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. Obstacle avoidance technique was implemented in this algorithm to avoid the congested areas. …”
Get full text
Get full text
Thesis -
14
A modified group authentication scheme for machine type communication in LTE/LTE-a networks
Published 2018“…High signalling congestion occurs during the verification phase since every MTC device needs to go through a full authentication process. …”
Get full text
Get full text
Thesis -
15
-
16
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
17
Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption
Published 2013“…The initial stage was the developed and verification of the used finite element (FE) model. Model verification is the process of determining that a model implementation accurately represents the developer’s conceptual description of the model and its solution. …”
Get full text
Get full text
Conference or Workshop Item -
18
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
Get full text
Get full text
Get full text
Get full text
Thesis
