Search Results - (( a constructive method algorithm ) OR ( program implementation based algorithm ))
Search alternatives:
- program implementation »
- implementation based »
- method algorithm »
- a constructive »
-
1
A parallel version of a binary method and vector addition chains precomputation for exponentiation in RSA / Siti Khatijah Nor Abdul Rahim and Siti Rozanae Ismail
Published 2006“…However, we also constructed an algorithm for a parallel version of Vector Addition Chains to enhance the performance. …”
Get full text
Get full text
Research Reports -
2
Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm
Published 2008“…Further more, a prototype hardware has been designed and constructed to test the success chromosome string, which called as GA based Logic Implementer (GALI). …”
Get full text
Get full text
Thesis -
3
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…In a conclusion, SEM prototype and adaptive communication data transfer algorithm with a combination of the three communication will be another method to solve a single communication problem of SM and suitable in residential location that offered the proposed communication infrastructure.…”
Get full text
Get full text
Thesis -
4
Enhancement of Ant System Algorithm for Course Timetabling Problem
Published 2009“…In order to develop a new algorithm for the course scheduling problem, this research follows the experimental research methodology that consist of problem analysis, designing algorithm, implementing algorithm as a computer program in order to examine the results, analyzing the results, and if necessary improving the algorithm by doing all those activities over and over again. …”
Get full text
Get full text
Get full text
Thesis -
5
Parallel Implementation of Two Level Barotropic Models Applied to the Weather Prediction Problem
Published 2004“…Then the parallel algorithms are constructed and run using the Beowulf Cluster machine. …”
Get full text
Get full text
Thesis -
6
Parallel Block Methods for Solving Ordinary Differential Equations
Published 2004“…Subsequently, a more structured and efficient algorithm comprising the block methods was constructed for solving systems of first order ODEs using variable step size and order. …”
Get full text
Get full text
Thesis -
7
The design and implementation of a two and three-dimensional triangular irregular network based GIS
Published 2000“…To facilitate the output of the developed methods and algorithms, software called TinSoft, which is a Windows-based Multiple Document Interface software was developed in this research.…”
Get full text
Get full text
Get full text
Thesis -
8
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…This thesis focussed on the development of PV module integrated with positive output (PO) buck-boost converter by intelligent control of MPPT technique. A novel of combination direct and indirect (CoDId) MPPT algorithm is implemented for solving mismatch losses from existing PV system by employing the implementation of system identification approach. …”
Get full text
Get full text
Thesis -
9
AI recommendation penetration testing tool for SQL injection: linear regression
Published 2025“…This project, Extreme programming methodology was used to construct the flow of the project. …”
Get full text
Get full text
Get full text
Article -
10
Feature clustering for pso-based feature construction on high-dimensional data
Published 2019“…This paper proposes a cluster based PSO feature construction approach called ClusPSOFC. …”
Get full text
Get full text
Get full text
Article -
11
Family of singly diagonally implicit block backward differentiation formulas for solving stiff ordinary differential equations
Published 2021“…Since absolute stability is a crucial characteristic for a method to be useful therefore, stability graphs of the methods derived are constructed by MAPLE programming. …”
Get full text
Get full text
Thesis -
12
Comparison Of Phylogenetic Trees Using Difference Distance Function Method
Published 2005“…This study is mainly about the construction of phylogenetic trees using for difference di stance functions methods. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
Get full text
Get full text
Thesis -
14
Volunteer Management System
Published 2012“…The project will adopt the Iterative and incremental development methodology, which promotes constant reevaluation, and will be built on the java programming language and developed on the Netbeans IDE, for the GUI and algorithm implementation. …”
Get full text
Get full text
Final Year Project -
15
Adaptive step size of diagonally implicit block backward differentiation formulas for solving first and second order stiff ordinary differential equations with applications
Published 2020“…These methods are implemented in diagonally implicit structure and generated the solutions of yn+1 and yn+2 simultaneously in a block. …”
Get full text
Get full text
Thesis -
16
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012“…The objective of this paper is to describe the implementation of autonomous navigation through the use of event-driven programming technique which was based on finite state machines (FSM). …”
Get full text
Get full text
Conference or Workshop Item -
17
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Implementation of autonomous vehicle navigation algorithms using event-driven programming
Published 2012“…The objective of this paper is to describe the implementation of autonomous navigation through the use of event-driven programming technique which was based on finite state machines (FSM). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
Get full text
Get full text
Thesis -
20
Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad
Published 2002“…Second experiment uses dynamic programmings apply with Wagner and Fischer algorithm.…”
Get full text
Get full text
Thesis
