Search Results - (( its application among algorithm ) OR ( code application using algorithms ))*
Search alternatives:
- application among »
- code application »
- using algorithms »
- its application »
- among algorithm »
-
1
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
-
4
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Many previous researches focused on elliptic curve and its applications in mobile communication. The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
5
-
6
-
7
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…Visual Studio has been used in order to code the program in C#. In addition, some research has been made through observation as well as referring to the published materials and the existing application of fingerprint and Raspberry Pi. …”
Get full text
Get full text
Thesis -
8
Numerical solution for Duffing-Van Der Pol Oscillator via block method
Published 2021“…The Duffing-Van Der Pol Oscillators is an interesting differential problem with many applications in mechanics and fluid dynamics. Among its most known application involves the chaotic motions in periodic-self excited oscillators and occasionally used to model hydrodynamic forces on canonical structures. …”
Get full text
Get full text
Article -
9
Numerical Solution For Duffing-van Der Pol Oscillator Via Block Method
Published 2024journal::journal article -
10
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004Get full text
Get full text
Final Year Project -
11
End-to-end DVB-S2X system design with deep learning-based channel estimation over satellite fading channels
Published 2021“…The channel estimation results indicate that the adopted DL architectures are more robust than conventional techniques when fewer training pilots are used for both fading channels. Although the conventional algorithm, MMSE, outperforms the pro�posed algorithms when the number of pilots increased but it is not applicable in real transmission as it is required prior knowledge about the channel statistic which is not the case with DL-based estimators which rely only on the pilots. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
-
15
-
16
The impact of Xiaohongshu as the primary information hub: a case study among utar undergraduates
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Chain code algorithm in deriving T-Junction and region of a freehand sketch
Published 2004“…The algorithm is based on 8-connected 3x3 windows of Freeman chain code. …”
Get full text
Get full text
Get full text
Article -
18
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…A Quick Response (QR) code is a popular type of two-dimensional barcode that is widely used in various applications. …”
Get full text
Get full text
Thesis -
19
Automatic marking system for programming subject
Published 2023“…This application handle execution of anonymous code that could be malicious securely by running the code in an isolate environment. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article
