Search Results - (( verification implementation function algorithm ) OR ( java implementation plan algorithm ))
Search alternatives:
- verification implementation »
- implementation function »
- java implementation »
- implementation plan »
- function algorithm »
- plan algorithm »
-
1
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Functionality verification is done using the test case provided by National Institute Standards and Technology (NIST). …”
Get full text
Get full text
Thesis -
2
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
5
A web-based implementation of k-means algorithms
Published 2022“…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Design of a floating point unit for 32-bit 5 stage pipeline processor
Published 2020“…The development project will start by studying the algorithm of addition on floating point numbers. The addition algorithm is then implemented in the FPU so that the FPU can perform addition on floating point numbers. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The development of this project is based on a framework of 5 main stages: planning, analysis, design, implementation and testing. …”
Get full text
Get full text
Thesis -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This methodology consist of Requirement and Planning, Design, Construction, Testing and Implementation. …”
Get full text
Get full text
Thesis -
9
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
10
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
11
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
13
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
14
Songs Search Using Human Humming Voice
Published 2007“…The scopes for this project are human humming voice, voice capture in WA V format, songs database, and MIDI file comparing algorithm. Methodologies used in this system are based on system analysis and design methodology comprising planning, analysis, design and implementation. …”
Get full text
Get full text
Final Year Project -
15
Partial encryption of compressed images employing FPGA
Published 2005“…In this paper, we present the realization of of partial encryption of compressed images on Altera FLEX10K FPGA device that allows for efficient hardware implementation. The compression algorithm decomposes images into several different parts. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The first controller design is formulated so as to allow on-line modeling, controller design and implementation and thus, yield a self-tuning control algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. Obstacle avoidance technique was implemented in this algorithm to avoid the congested areas. …”
Get full text
Get full text
Thesis -
18
-
19
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…A vector quantization model that incorporate rough sets attribute reduction and rules generation with a modified version of the K-means clustering algorithm was developed, implemented and tested as a part of a speech recognition framework, in which the Learning Vector Quantization (LVQ) neural network model was used in the pattern matching stage. …”
Get full text
Get full text
Thesis -
20
AUTO-MANAGE PARKING SYSTEM (AMPS)
Published 2019“…For functionality, the system only able to serve its basic function and it still need few improvements. …”
Get full text
Get full text
Final Year Project
