Search Results - (( developing function based algorithm ) OR ( code application during algorithm ))

Refine Results
  1. 1

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…Towards the end of the project, the algorithms would be executed in a base RISC-V core and an extended RISC-V core using simulation tools to perform performance analysis. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Nutrition Tracking Application Development by Mohd Zaki, Ahmad Mustafa

    Published 2023
    “…The proposed mobile application will calculate and calibrate the required calories and macronutrients the user needs based on the the calculations algorithms in the code that calculates the Basal Metabolic Rate (BMR) of the user based on their personal biological metrics such as their age, weight, height and gender. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  6. 6

    DEVELOPMENT OF A FATIGUE DAMAGE MONITORING SYSTEM USING DIGITAL IMAGE CORRELATION by KHOO, SZE WEI

    Published 2017
    “…First, a two-dimensional sub-pixel accuracy deformation measurement algorithm was coded using MATLAB. Attention has been given to improve the algorithm’s computational efficiency and measurement accuracy. …”
    Get full text
    Get full text
    Thesis
  7. 7

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…During the application's development, a wide literature review was conducted, users were interviewed and surveyed, and the developed application was iteratively built and redesigned. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Simulated Annealing Based Strategy for Test Redundancy Reduction by Kamal Z., Zamli, Mohd Hafiz, Mohd Hassin, Al-Kazemi, Basem, Naseer, Atif

    Published 2014
    “…Unlike existing works which rely on the Greedy approaches, our work adopts the random sequence permutation and optimization algorithm based on Simulated Annealing with systematic merging technique. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Late Acceptance Hill Climbing Based Strategy for Test Redundancy Reduction and Prioritization by Rohani, Abu Bakar, Kamal Z., Zamli, Basem, Al-Kazemi

    Published 2015
    “…In this manner, some impactful defects may be missed owing to the need to accommodate deadline shift from earlier development activities. In order to address these issues, this paper highlights our on-going work on the development of a novel test redundancy reduction strategy based Late Acceptance Hill Climbing, called (LAHCS). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Analytical model for partially prestressed concrete beam-column elements by Esfahani, Milad Hafezolghorani

    Published 2017
    “…Hence, in this study a new analytical model for PPC frame elements subjected to static and dynamic loads is developed. For this purpose, constitutive law and mathematical model for the three dimensional PPC beam-column element are formulated and a special finite element algorithm is developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Bidirectional detection method using for hall effects sensors for water flow measurement system by Garmabdari, Rasoul

    Published 2014
    “…Lastly, a measurement and monitoring algorithm is developed based on Labview to calculate the flow rate, water consumption and detect the error source and flow direction. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Development of an Isolated Digit Speech Recognition Based on Multilayer Perceptron Model by Mohamad Hussin, Ummu Salmah

    Published 2004
    “…A typical or fixed sigmoid function method is used in learning phase. In the recognition phase, an adaptive sigmoid function is employed. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei by Chen , Shilei

    Published 2021
    “…By integrating ISMA, both supervised and unsupervised machine learning algorithms were investigated to develop real-time damage identification schemes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…The rank-based methods, estimating algorithms, and resampling techniques that are developed do not involve the difficulties of the existing estimating procedures. …”
    Get full text
    Get full text
    Get full text
    Thesis