Search Results - (( developing function using algorithm ) OR ( code application model algorithm ))

Refine Results
  1. 1
  2. 2

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…This research work has generated an algorithmic effort estimation model for function points measurement. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Development Of Generative Computer-Aided Process Planning System For Lathe Machining by Zubair, Ahmad Faiz

    Published 2019
    “…Furthermore, to minimize unit production cost, machining parameters including cutting speed (CS), feed rate (f) and depth of cut (d) were optimized for regular form surfaces by using firefly algorithm (FA). These parameters were then useful for tooling selections and tool-path planning. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development of low power viterbi decoder on complex programmable logic device platform by Abu, Mohd Azlan

    Published 2018
    “…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Optimization of exclusive release policies for hydropower reservoir operation by using genetic algorithm by Tayebiyan, Aida, Mohammed Ali, Thamer Ahmed, Ghazali, Abdul Halim, Abdul Malek, Marlinda

    Published 2016
    “…These policies could only use in hydropower reservoir systems. Meanwhile, to determine the optimal operation of each policy, real coded genetic algorithm is applied as an optimization technique and maximizing the total power generation over the operational periods is chosen as an objective function. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Development of gene motif modulation for information processing in artificial DNA computing by Shamsudin, Ahmad Faizul, Suhaimi, Mohd Adam, Ibrahim Ali , Noorbatcha, Hussin, Ummu Salamah, A. F., Alya Khadijah, D., Nor Hidayah

    Published 2014
    “…The results indicate improvement in the convergence of information decay between artificial and natural systems using the later method. Further development of Gene Motif binary switch in artificial DNA computing may lead to a MAS algorithm that can simulate a natural DNA computing. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    A modified technique in RFID networking planning and optimization by Nawawi, Azli

    Published 2015
    “…In this research, PSO algorithm was used in the optimization process as it was considered as a very useful, efficient and well known algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Identification and predictive control of spray tower system using artificial neural network and differential evolution algorithm by Danzomo, Bashir A., Salami, Momoh Jimoh Eyiomika, Khan, Md. Raisuddin

    Published 2015
    “…A recurrent neural network (RNN) based on non-linear autoregressive with exogenous inputs (NARX) model has been used to develop the dynamic model of the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Development of finite element model for soil-structure interaction by Shoaei, Mohammad Dalili

    Published 2014
    “…In order to evaluate the accuracy of the developed code (2DSSI), a series of examples have been used as benchmarks to verify the analyses. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Deep learning convolutional neural network algorithms for the early detection and diagnosis of dental caries on periapical radiographs: a systematic review by Musri, Nabila, Christie, Brenda, Ichwan, Solachuddin Jauhari Arief, Cahyanto, Arief

    Published 2021
    “…Identifying caries with a deep convolutional neural network-based detector enables the operator to distinguish changes in the location and morphological features of dental caries lesions. Deep learning algorithms have broader and more profound layers and are continually being developed, remarkably enhancing their precision in detecting and segmenting objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios by Tayebiyan, Aida

    Published 2015
    “…In order to increase the system efficiency and maximize the power generation, constructed operation models were optimized. To determine the optimum solution in each policy, real coded genetic algorithm is used as an optimization technique. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Conceptual Design And Dynamical Analysis Of Aerostat System by Mahmood, Khurrum

    Published 2020
    “…A graphic user interface has been developed using MATLAB® app developer for design application. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Gaussian process-based inversion: A new approach for estimating hydrocarbon parameters in controlled-source electromagnetic application by Muhammad Naeim, Mohd Aris, Hanita, Daud, Dass, Sarat Chandra, Nagaratnam, Shalini, Noryanti, Muhammad, Evizal, Abdul Kadir, Maharani, Warih

    Published 2024
    “…Many inversion codes in marine controlled-source electromagnetic (CSEM) inverse problems use numerical partial differential equation (PDE) solvers as the forward solutions modelers. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    XML web services / Wong Kok Chuan by Wong, Kok Chuan

    Published 2003
    “…Next is the implementation phase which covers a brief description on the development environment used, explanations on a few algorithms used and the coding techniques and patterns which I followed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Current applications of machine learning in dentistry by Ghazali, Ahmad Badruddin, Reduwan, Nor Hidayah, Ibrahim, Roliana

    Published 2022
    “…The quality of the output depends on the quality of data used to train and validate the algorithm (Rowe, 2019). …”
    Get full text
    Get full text
    Book Chapter