Search Results - (( verification implementation phase algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code by Mohd Yunos, Mohd Amirul Syafiq, Anak Usang, Mark Dennis, Ithnin, Hanafi, Hussain, Siti Aslina, Mohamed Yusoff, Hamdan, Sipaun, Susan

    Published 2018
    “…To validate the simulation precision, a spiral trajectory of radioactive particle inside the bubble column region consist of 84 grid point locations of the particle were applied. Calibration algorithm was developed for radioactive isotopes Au-198 and Sc-46 particle position verification and determination of statistical uncertainty from the introduction of a various number of primary photon emission. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    A PLC-based Hybrid Fuzzy PID Controller for PWM-driven Variable Speed Drive by ARROFIQ, MUHAMMAD

    Published 2010
    “…A simulation model in MA TLAB/Simulink is developed using system identification technique to perform verification of the PLCbased intelligent controller of the PWM-driven VVVF algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    EduChain: CIA-compliant blockchain for intelligent cyber defense of microservices in education industry 4.0 by Rahman, Md. Arafatur, Mohd Saharudin, Abuludin, Ling, Xi Yuan, Islam, Md. Shohidul, A. Taufiq, Asyhari

    Published 2022
    “…The design comprises three phases, namely the blockchain framework, data sending-receiving, and confidentiality-integrity-availability over a secured platform with each phase having detailed mechanisms for algorithm implementation. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    A modified group authentication scheme for machine type communication in LTE/LTE-a networks by Ismail, Haqi Khalid

    Published 2018
    “…High signalling congestion occurs during the verification phase since every MTC device needs to go through a full authentication process. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi by Muhammad, Faisal

    Published 2024
    “…The village assistance programme can motivate and engage rural communities during the participatory and transparent phase of village development. The criteria used in this study were produced through the identification, verification, and validation stages by experts consisting of academian, government, and researchers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Minimization of torque ripple and flux droop using optimal DTC switching and sector rotation strategy by Ahmad Tarusan, Siti Azura

    Published 2022
    “…MATLAB/Simulink software is used to simulate the proposed strategies while a complete setup system consists of a DS1104 digital signal processor (DSP)-board (to implement the DTC algorithm), Field-programmable Gate Arrays (FPGA) (to implement the blanking circuit), two-level and five-level (CHB) inverter circuit, gate driver circuit, and a 1.1 kW induction motor with 2 kW DC generator as a load is developed for testing and verification purpose. …”
    Get full text
    Get full text
    Get full text
    Thesis