Search Results - (( developing code using algorithm ) OR ( based application optimisation algorithm ))

Refine Results
  1. 1

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Artificial immune network model based controller for vibration suppression of flexible structures by Md. Salleh, Salihatun, Tokhi, M. Osman, Toha, Siti Fauziah

    Published 2010
    “…The AiNet model based controller thus developed shows the capability of the approach with relatively better accuracy in comparison to using real-coded genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Active intelligent control of vibration of flexible plate structures by Md Salleh, Salihatun

    Published 2011
    “…In this work active intelligent control comprises a set of control techniques based on particle swarm optimisation (PSO), real coded genetic algorithm (RCGA) and artificial immune system (AIS). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…This could include for instance a systematic literature review on theories available to understand the current problem and its possible solution, analysis of the users need gathered from interviews, and of course the application development using Flutter within Visual Studio Code. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Arfict: Indoor navigation mobile application using augmented reality (AR) for FICT by Lee, Chorng Huah

    Published 2025
    “…Navigation paths are optimised using the A* algorithm, while ARCore integrates sensor data from the device’s gyroscope and accelerometer to enhance tracking accuracy. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Computation of pinch dynamics in plasma focus discharge using Lee model / Lim Ling Hong by Lim , Ling Hong

    Published 2021
    “…Lee model code has been developed based on the motion and circuit equations of a plasma focus discharge and the empirical data obtained in Mather type plasma focus. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Bats echolocation-inspired algorithms for global optimisation problems by Nafrizuan, Mat Yahya

    Published 2016
    “…The works related to swarm intelligence algorithms include the development of the algorithm itself, its modification and improvisation as well as its application in solving global optimisation problems. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20