Search Results - (( wave applications using algorithm ) OR ( data verification research algorithm ))
Search alternatives:
- applications using »
- research algorithm »
- wave applications »
- data verification »
- using algorithm »
-
1
-
2
Stroke-to-stroke matching in on-line signature verification
Published 2010“…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
Get full text
Get full text
Thesis -
3
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Data integrity must be ensured before and after the data transmission. …”
Get full text
Get full text
Thesis -
4
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
5
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
6
-
7
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…Usually, one sinusoidal wave is used for one inverter. In this design, SPWM is used for multilevel inverter application in photovoltaic (PV) system. …”
Get full text
Get full text
Student Project -
8
-
9
Modelling of tsunami wave spectra propagation run-up in Sri-Lanka and Indonesia
Published 2006Get full text
Get full text
Conference or Workshop Item -
10
Simulation of Tsunami Wave Spectra on Sri Lanka and Indonesia
Published 2006Get full text
Get full text
Article -
11
Simulation of Tsunami Wave Spectra on Sri-Lanka and Indonesia
Published 2006Get full text
Get full text
Article -
12
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…The hardware based of encryption chip become realizable with Field Programmable Gate Arrays (FPGAs). There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
13
-
14
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…The verification process is matched if the fusion score is greater than the pre-set threshold t. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Quasi linear algorithm for modelling shoreline change from AIRSAR/POLSAR polarized data
Published 2007Get full text
Get full text
Conference or Workshop Item -
16
Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks
Published 2018“…To avert this problem, this study proposes a new mechanism called random traveling wave pulse-coupled oscillator algorithm, which is a self-organizing technique for energy-efficient wireless sensor networks using the phase-locking traveling wave pulse-coupled oscillator and random method on anti-phase of the pulse-coupled oscillator model. …”
Get full text
Get full text
Article -
17
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…There is also an analysis that been done which is the verification of the algorithm in the developed application and the comparison between a different interpolation method. …”
Get full text
Get full text
Thesis -
18
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017Get full text
Get full text
Thesis -
19
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Hence there are large gaps of time and cost wastage which were not successfully addressed by previous research efforts. Lack of validation and verification of ABS model and results against broader dataset or domains, led to non-robust and unreliable simulation model and results. …”
text::Thesis -
20
Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection
Published 2015“…Several high frequency stress wave signals propagated in the tubes due to impact are captured using Acoustic Emission method. …”
Get full text
Get full text
Get full text
Article
