Search Results - (( basic application system algorithm ) OR ( using communication using algorithm ))

Refine Results
  1. 1
  2. 2

    Dynamic communication performance of the TESH network under nonuniform traffic patterns by Rahman, M.M. Hafizur, Inoguchi, Yasushi, Sato, Yukinori, Miura, Yasuyuki, Horiguchi, Susumu

    Published 2009
    “…In this paper, we evaluate the dynamic communication performance of the TESH network using dimension order routing algorithm under various nonuniform traffic patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Dynamic communication performance of a TESH network under the nonuniform traffic patterns by Rahman, M.M. Hafizur, Inoguchi, Yasushi, Sato, Yukinori, Miura, Yasuyuki, Horiguchi, Susumu

    Published 2008
    “…In this paper, we present a deadlock-free routing algorithm for the TESH network using 2 virtual channels - 2 being the minimum number for dimension-order routing - and evaluate the network's dynamic communication performance under various nonuniform traffic patterns, using the proposed routing algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Utilizing of flower pollination algorithm for brushless DC motor speed controller by Motakabber, S. M. A., Zahirul Alam, A. H. M., Nordin, Anis Nurashikin, Mahmud, Md

    Published 2020
    “…Currently, brushless direct current (BLDC) motors are becoming popular in electric vehicles, automation systems and industrial applications. Basically, the BLDC motors are a special type of electronically controlled electric motor systems. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5
  6. 6

    Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim by Hashim, Siti Zuraifah

    Published 2007
    “…It makes use of three basic operations in order to optimize this problem. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Convergence Analysis of the African Buffalo Optimization Algorithm by Odili, Julius Beneoluchi, M. N. M., Kahar, Noraziah, Ahmad

    Published 2016
    “…The analysis of the convergence of Nature-inspired optimization algorithms is necessary to help researchers and practitioners understand the workings of the algorithms in the algorithms’ attempts at solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Dynamic communication performance of a hierarchical torus network under non-uniform traffic patterns by Rahman, M.M. Hafizur, Horiguchi, Susumu

    Published 2004
    “…In this paper, we present a deadlock-free routing algorithm for the HTN using 3 virtual channels and evaluate the network's dynamic communication performance under three non-uniform traffic patterns, using the proposed routing algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
    Get full text
    Get full text
    Research Reports
  11. 11

    Improving PID controller of motor shaft angular position by using genetic algorithm by Muhamad, Arif Abidin

    Published 2015
    “…This paper explores the well established methodologies of the literature to realize the workability and applicability of Genetic Algorithms for process control applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Development of land target following system of hexacopter by Zakaria, Abdul Hafiz, Mohd Mustafah, Yasir, M. Hatta, Muhd. Mudzakkir, N. Azlan, Muhd. Nadzif

    Published 2015
    “…This paper discussed the development of a land target following system for hexacopter using on-board camera. The camera will detect the specified land target during the flight of the hexacopter and communicate with the base station to produce the GPS location of the target for necessary actions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    TTN: a high performance hierarchical interconnection network for massively parallel computers by Rahman, M.M. Hafizur, Inoguchi, Yasushi, Sato, Yukinori, Horiguchi, Susumu

    Published 2009
    “…We also present a deadlock-free routing algorithm for the TTN using four virtual channels and evaluate the network's dynamic communication performance using the proposed routing algorithm under uniform and various non-uniform traffic patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Vault’s floor security sensor with RFID access using microcontroller: article / Mohd Firdouz Bahtiar by Bahtiar, Mohd Firdouz

    Published 2009
    “…Users will be given the RFID smartcard for the access pass identity, the designated floor will then be armed with a source of light ( laser pointer as indicator should any message will be given to the user. The system uses a microcontroller for the simple algorithm of the signal processing. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Mobile Robot with Navigation Control and Communication by Mohammad Yatim, Amirah Izzati

    Published 2016
    “…Other than that, various algorithm can be applied to it with the need to physically access on-board microcontroller for programming. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…The use of Cryptographic Application Programming Interface (CAPI) to bridge the application and the hardware, and the associated communication layer in the embedded system is also discussed. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Vault's floor security sensor with RFID access using microcontroller/ Mohd Firdouz Bahtiar by Bahtiar, Mohd Firdouz

    Published 2009
    “…Users will be given the RFID smartcard for the access pass identity, the designated floor will then be armed with a source of light ( laser pointer ) and an LCD as indicator should any message will be given to the user. The system uses a microcontroller for the simple algorithm of the signal processing. …”
    Get full text
    Get full text
    Thesis
  20. 20