Search Results - (( basic computing ((can algorithm) OR (new algorithm)) ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A highly efficient algorithm for phased-array mmWave massive MIMO beamforming by Althuwayb, Ayman Abdulhadi, Hashim, Fazirulhisyam, Liew, Jiun Terng, Khan, Imran, Jeong, Woo Lee, Affum, Emmanuel Ampoma, Ouahabi, Abdeldjalil, Jacques, Sébastien

    Published 2021
    “…Simulation results show that the proposed algorithm significantly improves system performance and reduces computational complexity by more than 45% compared to traditional algorithms.…”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…This block cipher is suitable to be applied to small devices such as mobile phones and PDAs. The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
    Get full text
    Get full text
    Thesis
  13. 13

    A modified reweighted fast consistent and high-breakdown estimator for high-dimensional datasets by A. Baba, Ishaq, Midi, Habshah, June, Leong W., Ibragimov, Gafurjan

    Published 2024
    “…Thus, the new proposed algorithm can be applied to solve the problem of regression outliers in high-dimensional data (HDD) and serve as a better alternative to the minimum regularized covariance determinant (MRCD) estimator. © 2024 The Author(s)…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad by Abd Rahman, Abdullah Sani, Ahmad, Samsiah

    Published 2022
    “…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. By using Microsoft Visual Basic 6.0, the Graphical User Interfaces (GUIs) of the application to provide an easy or user-friendly monitoring application. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif

    Published 2016
    “…A new mathematical modelling and computer algorithm is developed and calibrated which are based on image processing methods. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Unconstraint assignment problem : a molecular computing approach by Zuwairie, Ibrahim, Yusei, Tsuboi, Osamu, Ono, Marzuki, Khalid

    Published 2006
    “…Since DNA computing is very suitable for combinatorial problems, in thispaper, an idea on DNA-based computing algorithm for solving unconstraint assignment problem is proposed. …”
    Get full text
    Get full text
    Article
  19. 19

    Fingerprint reconstruction based on improved directional image by Othman, Mohamad Kharulli

    Published 2005
    “…By using the directional image as ridges orientations map, its original fingerprint image is filtered using the Directional Fourier filtering to produce a new fingerprint image. The reconstruction algorithm was tested with 500 fingerprint images. …”
    Get full text
    Get full text
    Thesis
  20. 20