Search Results - (( 5s implementation developing algorithm ) OR ( basic implementation using algorithm ))
Search alternatives:
- implementation developing »
- basic implementation »
- implementation using »
- 5s implementation »
- using algorithm »
-
1
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The 1024 bit implementation uses 7000 Logic Elements (LE) on the Altera Stratix EP1S40-F780C5 FPGA development board which roughly translates to 49,000 gates. …”
Get full text
Get full text
Thesis -
2
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
3
Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli
Published 2017“…The basic feature extraction of minimum, maximum and mean of gray level values are used as the parameter to develop the prototype. …”
Get full text
Get full text
Thesis -
4
Real time monitoring and controlling using Petri net algorithm for batch process plant / Mohamad Shaiful Osman
Published 2010“…Petri net can be applied to event related process control in simulating, checking, debugging, and stating the quantitative deviations from the ideal solutions of any given continuous or discrete process as well as providing formal checking at all development stages from specification, design and implementation . This thesis searches the basic concepts and uses of the classical method Petri net algorithm in SCADA system to control and monitoring the process plant. …”
Get full text
Get full text
Thesis -
5
Control of Omni-Directional Mecanum wheel mobile Robot and analysis of Artificial Muscle
Published 2009“…Basic mobility algorithm using BasicStamp software was developed to test the basic mobility capabilities and test the qualitative view of the system's mobility performance. …”
Get full text
Article -
6
Speech recognition system using MATLAB : design, implementation, and samples codes
Published 2011“…Basically, the system is able to recognize the spoken utterances by translating the speech waveform into a set of feature vectors using Mel Frequency Cepstral Coefficients (MFCC) technique, which then estimates the observation likelihood by using the Forward algorithm. …”
Get full text
Get full text
Get full text
Book -
7
-
8
A network based fetal ECG monitoring algorithm
Published 2011“…The hardware part is developed for abdominal Electrocardiography (AECG) data acquisition system. Individual algorithms and customized application software are developed using Visual Basic for both the networking and Fetal Heart Rate (FHR) monitoring systems. …”
Get full text
Get full text
Get full text
Article -
9
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
10
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
11
-
12
Visual tracking and servoing of human face for robotic head Amir-II
Published 2010“…The algorithm basically compares the locations of the face in the image plane that is detected from the static face image captured from real-time video stream. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Zero skew clock routing for fast clock tree generation
Published 2008“…The routing algorithm used in this tool is based on the Exact Zero Skew Routing Algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Dynamical fuzzy autocatalytic set of combustion process in circulating fluidized bed boiler using transition matrix / Hazwani Hashim
Published 2014“…Thus it leads to the establishment of an improvised Graph Dynamics Algorithm which is used to assist the analysis of graph dynamics of FACS in CFB. …”
Get full text
Get full text
Thesis -
15
A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system
Published 2018“…This work proposes the extreme learning machine (ELM) is one of the poplar machine learning algorithms which, easy to implement with excellent learning performance characteristics. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Ultrasonic Tomography System For Liquid/Gas Flow: Frame Rate Comparison Between Visual Basic And Visual C++ Programming
Published 2006“…Real-time simulation of ultrasonic tomography system applied to liquid and gas flow has been implemented by previous researcher using Visual Basic 6.0 software programming. …”
Get full text
Get full text
Get full text
Article -
17
A new 128-bit block cipher
Published 2009“…This block cipher uses only basic operations, key dependent S-box and XOR IS together so that it can be efficiently implemented on various platforms. …”
Get full text
Get full text
Thesis -
18
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail
Published 2014“…In the third phase, external knowledge sources such as knowledge model from Agropedia is embedded as the basic element of ontology development. Then, the basic element is use ontology editor for implementation phase. …”
Get full text
Get full text
Thesis -
20
Assessment of dynamic spectrum allocation technique in heterogeneous network
Published 2017“…The first paper is about the basic OFDM structure using GNU Radio software and implemented using USRP hardware. …”
Get full text
Get full text
Get full text
Get full text
Article
