Search Results - (( based chain based algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Energy-efficient two-stage chain protocol routing algorithm for wireless sensor networks by Farhan, Husam Kareem

    Published 2014
    “…The new TSCP routing algorithm is compared with other similar grid-based routing algorithms namely Chain-Cluster based Mixed routing (CCM) and Chain-Chain Based Routing Protocol (CCBRP). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhanced Community Detection Based On Cross Time For Higher Visibility In Supply Chain: A Six-Steps Model Framework by Abal Abas, Zuraida, Mohd Zaki, Nurul Hafizah, Asmai, Siti Azirah, Abdul Rahman, Ahmad Fadzli Nizam, Zainal Abidin, Zaheera

    Published 2019
    “…This paper proposed six steps model framework that aim: (1) To construct the nodes and vertices for temporal graph representing the relationship in supply chain network; (2) To propose an enhanced temporal community detection algorithm in graph analytics based on Cross-time approach and (3) To evaluate the enhanced temporal community detection algorithm in graph analytics for representing relationship in supply chain network based on external and internal quality analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…In this paper, an efficient computation algorithm for LUC Cryptosystem is developed. It is based on Addition Chain. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11

    Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional by Haron, Habibollah

    Published 2006
    “…This study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code and Vertex chain code algorithm as picture description language, and a new computational algorithm and neural network classifier for corner detection. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Bilinear pairings computation using the extended double-base chains algorithm by Mohammed Ismail, Abdulwahed, Md. Said, Mohamad Rushdan, Mohd Atan, Kamel Ariffin, Rakhimov, Isamiddin Sattarovich

    Published 2010
    “…The computation efficiency of the Weil and Tate pairings mainly depends on the efficiency of the EC scalar multplications algorithms used. In this paper, we compute the Tate pairing using multi-base number representation(MBNR) system in scalar multiplication instead of using binary representation as used in Miller’s algorithm and in the double-base (DB) chain used by Changan Zhao et al. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Energy efficient Two Stage Chain Routing Protocol (TSCP) for wireless sensor networks by Kareem, Husam, Hashim, Shaiful Jahari, Subramaniam, Shamala, Sali, Aduwati

    Published 2014
    “…The main objectives of TSCP is to minimize the total energy consumption, achieve more load balancing and increase the network lifetime with more stability compared with other routing algorithms, for examples Chain-Cluster based Mixed routing (CCM) and Chain-Chain Based Routing Protocol (CCBRP). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…Based on the analysis, the algorithm of neural network classifier corner detector for FCC was found to have more potentials in terms of accuracy of corner detection and suitability of the chain code. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A new corner detection algorithm for chain code representation. by Haron , Habibollah, Shamsuddin , Siti Mariyam, Mohamed, Dzulkifli

    Published 2005
    “…The algorithm is based on chain-coded image, deriving the slope between each code, analyze the series of chain code, and finally decide the existence of corner at the current pixel location. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    The implementation of forward chaining algorithm in calculating inheritance property based on faraid law / Nur Ain Syafiqah Mohammad Marzuki by Mohammad Marzuki, Nur Ain Syafiqah

    Published 2021
    “…Therefore, the purpose of this study is to facilitate the use of Forward Chaining Algorithm to calculate Faraid based on inheritance division. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Synthesis of transistor-chaining algorithm for CMOS cell layout using bipartite graph / Azizi Misnan by Misnan, Azizi

    Published 1997
    “…The algorithm takes a transistor level circuit schematic and the outputs a minimum set of chains. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Hybrid Diagnosis Model To Determine Fault Isolation For Scan Chain Failure Analysis On 22nm Fabrication Process by Victor Paulraj, Eric Paulraj

    Published 2016
    “…Scan chain fault diagnosis plays an important role as with the implementation of Scan based testing, it is reported that 10%-30% of defects in a Scan based design occurs within the Scan chain itself. …”
    Get full text
    Get full text
    Thesis