Search Results - (( developing function a algorithm ) OR ( code application using algorithm ))
Search alternatives:
- developing function »
- code application »
- using algorithm »
- a algorithm »
- function a »
-
1
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…A Quick Response (QR) code is a popular type of two-dimensional barcode that is widely used in various applications. …”
Get full text
Get full text
Thesis -
2
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
Get full text
Get full text
Thesis -
3
Development of a scalable video compression algorithm
Published 2012“…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The QR code was used as a mechanism to activating the function for mobile application and determining the location, while EAN-13 barcode was used as a product identification. …”
Get full text
Get full text
Thesis -
5
Development of low power viterbi decoder on complex programmable logic device platform
Published 2018“…Space Time Trellis Code (STTC) and Viterbi algorithm combinations are known to offer a robust forward error correction system. …”
Get full text
Get full text
Get full text
Thesis -
6
Job recruiting system using sorting Algorithm / Adi Asyraf Ayob
Published 2020“…The purpose of this project is to develop a web-based job recruiting system with implementation of sorting algorithm. …”
Get full text
Get full text
Thesis -
7
Online Programming Judge System (UOJ)
Published 2013“…This research conducts a study to build an Online Programming Judge system with a mechanism to generate test cases automatically using Particle Swarm Optimization (PSO) algorithm. …”
Get full text
Get full text
Final Year Project -
8
A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations
Published 2009“…This function can be integrated into a bigger table to replace the calculations of inverse and multiply operations, if it provides enough memory. …”
Get full text
Get full text
Article -
9
Effort Estimation Model for Function Point Measurement
Published 2007“…Software Cost Estimation is a practical process that is applied to find out basically the effort and development time requirements for a software product, which is going to be developed. …”
Get full text
Get full text
Thesis -
10
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…Therefore, a single automatic system that able to transfer CAD data into machining readable data through CAM data had been developed.…”
Get full text
Get full text
Thesis -
11
Optimisation of multi-stage production-inspection stations using genetic algorithm
Published 2000“…The main goal of this work is to develop an efficient optimisation tool which will minimise the cost functions of the stated optimisation problems. …”
Get full text
Get full text
Article -
12
An Optimized PID Parameters for LFC in Interconnected Power Systems Using MLSL Optimization Algorithm
Published 2016“…This research presents the load frequency control (LFC) of three interconnected power systems using a MultiLevel Single Linkage algorithm (MLSL) and a proportional-integral derivative (PID) control approach. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
RISC-V instruction set extension on blockchain application
Published 2024“…However, blockchain required a high computing power to function. Although there were numerous ways to improve the performance speed of blockchain technology in software implementations, hardware implementation of the blockchain algorithms was a more preferred choice due to the emerging open-source computer architecture, RISC-V. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Solving Boundary Value Problems for Ordinary Differential Equations Using Direct Integration and Shooting Techniques
Published 1999“…In this thesis, an efficient algorithm and a code BVPDI is developed for solving Boundary Value Problems (BVPs) for Ordinary Differential Equations (ODEs). …”
Get full text
Get full text
Thesis -
17
A modified technique in RFID networking planning and optimization
Published 2015“…In this research, PSO algorithm was used in the optimization process as it was considered as a very useful, efficient and well known algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Maze solving balbot
Published 2010“…This paper concerns with the development of a two wheels balancing robot as the maze solver. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Development of images segmentation using image thresholder and batch processing technique on the blood smears
Published 2022“…Finally, we've combined the code for finding circles matching image histograms and the parasite threshold detection logic into a single function to quickly examine the performance of this function on the other images using the image batch processing technique. …”
Get full text
Get full text
Get full text
Article -
20
Optimization of exclusive release policies for hydropower reservoir operation by using genetic algorithm
Published 2016“…Meanwhile, to determine the optimal operation of each policy, real coded genetic algorithm is applied as an optimization technique and maximizing the total power generation over the operational periods is chosen as an objective function. …”
Get full text
Get full text
Get full text
Article
