Search Results - (( data verification using algorithm ) OR ( data visualization using algorithm ))

Refine Results
  1. 1

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Real time traceability module for halal logistic transportation using GPS and geofence technique by Mohamad, Maizatul Akma

    Published 2016
    “…The verification and simulation report illustrate that the module and improved algorithm has successfully been executed to deliver a report of tracking that is in accordance with the requirements of administering Halal goods. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…In the past, MOD was mainly tackled using image registration, which discovers correspondences between consecutive frames using pair-wise grayscale spatial visual appearance matching under rigid and affine transformations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Local and global measures for measuring performance of big data analytics process by Ali, Ismail Mohamed

    Published 2019
    “…More has been written about the quality of big data, its dimensions and algorithms applied on data to solve complex problems. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Budget visualizer using circle packing technique / Nursyahira Zulkeply by Zulkeply, Nursyahira

    Published 2019
    “…In order to construct this data visualization, the circle packing algorithm is used to visualize these budgets. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Signature verification system using support vector machine by Fauziyah, Salehuddin, Azlina , Othman

    Published 2009
    “…The common verification algorithm is one of the Global Feature Vector Machine called Support Vector Machine (SVM). …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…The aim of the proposed approach is to study the benefit of using visualization techniques to explorer Genetic Algorithm data based on gene values. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Intelligent biometric signature verification system incorporating neural network by Lim, Boon Han, Mailah, Musa

    Published 2005
    “…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Daily streamflow forecasting using simplified rule-based fuzzy logic system by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin, Harun, Sobri

    Published 2005
    “…Verifications of the calibrated models were done using the data set of the following year. …”
    Get full text
    Get full text
    Article
  20. 20

    Fusion model of unmanned aerial vehicle-based digital elevation model for accuracy improvement mapping by Isola, Ajibola Ismaila

    Published 2020
    “…The photos were processed using Agisoft algorithm. In the end, seven DEMs were exported in tiff file format. …”
    Get full text
    Get full text
    Thesis