Search Results - (( code application optimisation algorithm ) OR ( java applications out algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Development of CAD/CAM System for Cold Working Closed Die Forging Process by Abdulmawlla, Mohamed A.

    Published 2000
    “…In the second stage, a finite element analysis and optimisation algorithm was developed to examine the die fatigue life and to optimise the die design. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
    Get full text
    Get full text
    Student Project
  13. 13

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. The completed web application is then hosted on Heroku. k-luster allows users to upload their own data set, or choose from one of three samples if they just want to try out the application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    BinDCT Design and Implementation on FPGA with Low Power Architecture by Jabbar, Mohamad Hairol

    Published 2008
    “…Its performances in term of Peak Signal-to-Noise (PSNR), compression ratio and coding gain is proved to be best approximation to the DCT algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…However, the increased security breaches of recent mental health applications that leaked the patient's profile. This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  20. 20