Search Results - (( developing ((function max) OR (function _)) algorithm ) OR ( code application using algorithm ))

Refine Results
  1. 1

    Development of low power viterbi decoder on complex programmable logic device platform by Abu, Mohd Azlan

    Published 2018
    “…This thesis however proposes to remove the “Add” function in this Viterbi algorithm by comparing the minimum value of branch metric from the four states of branch metrics, selecting the minimum values and encoding the minimum branch metrics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…A Quick Response (QR) code is a popular type of two-dimensional barcode that is widely used in various applications. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The development process for this simulation is using programming language of Microsoft Visual C I t 6.0 and the coding creation depends on the algorithm flowchart and the formula pseudocode. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…The QR code was used as a mechanism to activating the function for mobile application and determining the location, while EAN-13 barcode was used as a product identification. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Job recruiting system using sorting Algorithm / Adi Asyraf Ayob by Ayob, Adi Asyraf

    Published 2020
    “…The sorting algorithm will assist the recruiters in selecting best job candidate by assigning score to each applicants and sort the applicant list by the finest score value. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Online Programming Judge System (UOJ) by Tran , Quang Trung

    Published 2013
    “…Moreover, the mechanism of test cases generation using PSO algorithm is deeply analyzed. The study would focus on the primary structure of PSO and the proposed fitness function to calculate fitness value for each generated test case. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Effective downlink resource management for wimax networks by Shareef, Zayd Ashraf Najeeb

    Published 2018
    “…Our EDRM framework involves three functions: Class-Based Scheduling (CBS) algorithm, Dynamic Bandwidth Allocation (DBA) scheme and Link Session Management (LSM) policy. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations by Mohd Ali, Fakariah Hani, Mahmod, Ramlan, Rushdan, Mohammad, Abdullah, Ismail

    Published 2009
    “…These modules are included in the Mixcolumn function. From the proposal of AES, the Mixcolumn function was suggested to solve the problem of delay by using look-up tables. …”
    Get full text
    Get full text
    Article
  10. 10

    Development Of Generative Computer-Aided Process Planning System For Lathe Machining by Zubair, Ahmad Faiz

    Published 2019
    “…To validate the generated tool-path, G-codes generated in media package file (MPF) file format and verified through CNC lathe machine. Indeed, the developed algorithm was able to determine the minimum unit production cost of lathe machining part model. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…This research work has generated an algorithmic effort estimation model for function points measurement. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimisation of multi-stage production-inspection stations using genetic algorithm by Hassan, Azmi, Pham, Duc Trung

    Published 2000
    “…The main goal of this work is to develop an efficient optimisation tool which will minimise the cost functions of the stated optimisation problems. …”
    Get full text
    Get full text
    Article
  13. 13

    An Optimized PID Parameters for LFC in Interconnected Power Systems Using MLSL Optimization Algorithm by Najeeb, Mushtaq, Shahooth, Mohammed, Mohaisen, Arrak, Ramdan, Razali, Hamdan, Daniyal

    Published 2016
    “…Integral Square Error (ISE) is considered as an objective function for both algorithms to determine its performance index value for the same interconnected power system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios by Tayebiyan, Aida

    Published 2015
    “…To determine the optimum solution in each policy, real coded genetic algorithm is used as an optimization technique. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…One of the most common cryptographic algorithms used in blockchain would be selected in this paper, typically djb2 hash algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Solving Boundary Value Problems for Ordinary Differential Equations Using Direct Integration and Shooting Techniques by V., Malathi

    Published 1999
    “…In this thesis, an efficient algorithm and a code BVPDI is developed for solving Boundary Value Problems (BVPs) for Ordinary Differential Equations (ODEs). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Designing and Developing an Intelligent Congkak by Muhammad Safwan, Mohd Shahidan

    Published 2011
    “…and “Can Min-Max algorithm (MM) be speeded up by using NN as a forward-pruning method?”. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A modified technique in RFID networking planning and optimization by Nawawi, Azli

    Published 2015
    “…In this research, PSO algorithm was used in the optimization process as it was considered as a very useful, efficient and well known algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis