Search Results - (( verification implementation model algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- verification implementation »
- implementation model »
- implication based »
- java implication »
- model algorithm »
-
1
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…This analysis is done to verify the algorithm of interpolation method and to find the best interpolation method for implement in the developed android application. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…Since the implementation of scheduling algorithm is an open issue in LTE, many packet scheduling algorithms have been proposed by researchers. …”
Get full text
Get full text
Thesis -
5
Offline signature verification system using hidden markov model (HMM) analysis of varying number of states and state transition topology
Published 2023“…The testing reported in this paper has been carried out on signature samples of 100 users which contain both their genuine as well as their skilled and random forged signature samples counterparts. The chosen algorithm is simple to be implemented which results in fast verification operation, and at thesame time is reliable in detecting forgeries. � 2009 WASET.ORG.…”
Article -
6
Development of biosignals-based multimodal biometric system
Published 2014“…Heart Sound Verification (HSV) provides an average equal error rate (EER) of 13.8% while the average EER for the Speaker Verification model (SV) is 2.1 %. …”
Get full text
Get full text
Get full text
Thesis -
7
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…A few distinct applications of hash algorithms are digital signatures, digital time stamping and the message integrity verification. …”
Get full text
Get full text
Get full text
Article -
8
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…A few distinct applications of hash algorithms are digital signatures, digital time stamping and the message integrity verification. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Design of a floating point unit for 32-bit 5 stage pipeline processor
Published 2020“…The development project will start by studying the algorithm of addition on floating point numbers. The addition algorithm is then implemented in the FPU so that the FPU can perform addition on floating point numbers. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The first controller design is formulated so as to allow on-line modeling, controller design and implementation and thus, yield a self-tuning control algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
Fuzzy Mixed Assembly Line Sequencing and Scheduling Optimization Model Using Multiobjective Dynamic Fuzzy GA
Published 2014“…An improved genetic algorithm called fuzzy adaptive genetic algorithm (FAGA) is proposed in order to solve this optimization model. …”
Get full text
Get full text
Get full text
Article -
14
Active intelligent control of vibration of flexible plate structures
Published 2011“…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
Get full text
Get full text
Thesis -
15
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
16
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…A vector quantization model that incorporate rough sets attribute reduction and rules generation with a modified version of the K-means clustering algorithm was developed, implemented and tested as a part of a speech recognition framework, in which the Learning Vector Quantization (LVQ) neural network model was used in the pattern matching stage. …”
Get full text
Get full text
Thesis -
17
Case driven TLC model checker analysis in energy scenario
Published 2023“…To foster the functional safety of corresponding program-algorithmic solutions, the model checking techniques and related tools are applied to the formal specifications of named solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
19
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…In conclusion, the successful implementation of MGWO and ensemble model makes a valuable contribution to scientific arena.…”
Get full text
Get full text
Thesis -
20
A New Model of Securing Iris Authentication Using Steganography
Published 2011“…Theoretically, the proposed model is promising a high security performance implementation in the future.…”
Get full text
Get full text
Article
