Search Results - (( verification implementation phase algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- verification implementation »
- implementation phase »
- implication based »
- java implication »
- phase algorithm »
-
1
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
2
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
3
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
4
Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code
Published 2018“…To validate the simulation precision, a spiral trajectory of radioactive particle inside the bubble column region consist of 84 grid point locations of the particle were applied. Calibration algorithm was developed for radioactive isotopes Au-198 and Sc-46 particle position verification and determination of statistical uncertainty from the introduction of a various number of primary photon emission. …”
Get full text
Get full text
Get full text
Article -
5
-
6
The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a...
Published 2014“…However, the current implementation of Wi-Fi does not offer enough security protection. …”
Get full text
Get full text
Get full text
Book Section -
7
A PLC-based Hybrid Fuzzy PID Controller for PWM-driven Variable Speed Drive
Published 2010“…A simulation model in MA TLAB/Simulink is developed using system identification technique to perform verification of the PLCbased intelligent controller of the PWM-driven VVVF algorithm. …”
Get full text
Get full text
Thesis -
8
EduChain: CIA-compliant blockchain for intelligent cyber defense of microservices in education industry 4.0
Published 2022“…The design comprises three phases, namely the blockchain framework, data sending-receiving, and confidentiality-integrity-availability over a secured platform with each phase having detailed mechanisms for algorithm implementation. …”
Get full text
Get full text
Get full text
Article -
9
-
10
A modified group authentication scheme for machine type communication in LTE/LTE-a networks
Published 2018“…High signalling congestion occurs during the verification phase since every MTC device needs to go through a full authentication process. …”
Get full text
Get full text
Thesis -
11
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
12
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…The village assistance programme can motivate and engage rural communities during the participatory and transparent phase of village development. The criteria used in this study were produced through the identification, verification, and validation stages by experts consisting of academian, government, and researchers. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Minimization of torque ripple and flux droop using optimal DTC switching and sector rotation strategy
Published 2022“…MATLAB/Simulink software is used to simulate the proposed strategies while a complete setup system consists of a DS1104 digital signal processor (DSP)-board (to implement the DTC algorithm), Field-programmable Gate Arrays (FPGA) (to implement the blanking circuit), two-level and five-level (CHB) inverter circuit, gate driver circuit, and a 1.1 kW induction motor with 2 kW DC generator as a load is developed for testing and verification purpose. …”
Get full text
Get full text
Get full text
Thesis
