Search Results - (( its applications among algorithm ) OR ( its application during algorithm ))*

Refine Results
  1. 1

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…A security criteria, outlines the authentication algorithm and key to be used during the registration process. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Photovoltaic-based single-ended primary-inductor converter with dual-fuzzy logic control-based maximum power point tracking by Ramalu, Tanaselan

    Published 2016
    “…Due to its maintenance free, ease of implementation and free of pollution, its demand increases rapidly in residential and industrial applications. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…After applying the denoising algorithm on the contaminated image, the cycling spinning algorithm is applied to increase the visual quality of the restored image. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Dynamical fuzzy autocatalytic set of combustion process in circulating fluidized bed boiler using transition matrix / Hazwani Hashim by Hashim, Hazwani

    Published 2014
    “…Here, specific transition matrix of FACS in CFB is developed and its basic properties which relates to Perron-Frobenius theorem are investigated. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Reactive power imbalance method for islanding detection in micro-grid operation by Shamshiri, Meysam, Sapar, Ahmad Farid, Chin, Kim Gan, Tengga Daram, Revinnath, Ab Ghani, Mohd Ruddin

    Published 2014
    “…Its major function is to ensure the stable operation during the fault and a variety of utility grid disruption. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Seamless horizontal handover algorithm for homogeneous wireless mobile networks using fuzzy logic by Ibrahim, Mohammed Khaleel

    Published 2013
    “…The most important and society application of WiMAX is the mobile communication. When a mobile station changes its geographical position, it may also need to change its attachment point in the network in order to retain the quality of the connection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    The Estimation of Air Temperature from NOAA/AVHRR Images and the study of NDVI-Ts impact by Matori, A.N, Hassaballa, A. Haleem

    Published 2011
    “…From the brightness temperature in the images thermal bands 4&5 and using ε the surface temperature Ts was extracted using three different split-window algorithms. The application of the three formulas showed a homogenous results specially when using Becker et al (1990) and Uliveri et al. (1994) algorithms. …”
    Get full text
    Get full text
    Article
  18. 18

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20