Search Results - (( data implementation using algorithm ) OR ( basic computing a algorithm ))
Search alternatives:
- implementation using »
- data implementation »
- using algorithm »
- basic computing »
- computing a »
- a algorithm »
-
1
Accelerating graph algorithms with priority queue processor
Published 2006“…In this work, we demonstrate how to accelerate graph algorithms using priority queue processor. DijkstraÂ’s algorithm is chosen as the target implementation, as many state-of-the-art graph algorithms use DijkstraÂ’s algorithm at the heart of their computational engine. …”
Get full text
Get full text
Article -
2
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
3
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…Basically it is used for message digest. One of the algorithms in hash function is RIPEMD-160. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
4
Voting algorithms for large scale fault-tolerant systems
Published 2011“…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
Get full text
Get full text
Thesis -
5
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…Basically, it is used for message digest. RIPEMD-160 is one of the algorithms in hash function that can improve the security in storing information. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
6
A network based fetal ECG monitoring algorithm
Published 2011“…The hardware data acquisition system acquires the mother’s AECG data by using a commercial ECG frontend microchip, called CARDIC and stores the data in a local computer terminal. …”
Get full text
Get full text
Get full text
Article -
7
Stochastic process and tutorial of the African bufalo optimization
Published 2022“…Again, our ability to describe the algorithm’s basic flow, stochastic and data generation processes in a language so simple that any non-expert can appreciate and use as well as the practical implementation of the popular benchmark Rosenbrock and Shekel Foxhole functions with the novel algorithm will assist the research community in benefiting maximally from the contributions of this novel algorithm. …”
Get full text
Get full text
Get full text
Article -
8
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
9
Investigating and developing the best method in shortest path for implementing a geographical information system (e-map) for Peninsular Malaysia
Published 2005“…Assessment will be done by calculating the algorithm complexion and runtime using the computer. …”
Get full text
Get full text
Monograph -
10
CHAOS BASED BLOCK ENCRYPTOR
Published 2008“…This project is basically a block encryption to protect block of data. …”
Get full text
Get full text
Final Year Project -
11
Web usage mining for UUM learning care using association rules
Published 2004“…E-Leaming is one of the Web based application where it will facing with large amount of data. In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Thesis -
12
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…E-Learning is one of the Web based application where it will facing with large amount of data. In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…The aim of this study were to conduct a research on how to identify the implementation of security analysis of image using 3D-AES block cipher algorithm. …”
Get full text
Get full text
Thesis -
14
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003“…Then, the system implementation part explains the selected tools chosen for implementing the system which using the Clementine Data Mining Solution. …”
Get full text
Get full text
Thesis -
15
-
16
A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods
Published 2014“…Third, the range which is defined as left or right is used for gesture recognition. Lastly, the basic transformation such as rotation, translation and scale is executed if a data motion lies within the range. …”
Get full text
Get full text
Academic Exercise -
17
Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran
Published 2021“…Subsequently, a computer algorithm and interfacing tool is developed. …”
Get full text
Get full text
Get full text
Thesis -
18
The implementation of post-processing data thinning for multibeam echo sounding data
Published 2006“…This paper elaborates on the development of data thinning programs using Microsoft Visual Basic Version 6. Various algorithms namely Douglas Peucker, Single Swathe Reducer and Skip N Points are referred. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article
