Search Results - (( developing function using algorithm ) OR ( code application system algorithm ))

Refine Results
  1. 1

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The development process for this simulation is using programming language of Microsoft Visual C I t 6.0 and the coding creation depends on the algorithm flowchart and the formula pseudocode. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Job recruiting system using sorting Algorithm / Adi Asyraf Ayob by Ayob, Adi Asyraf

    Published 2020
    “…The purpose of this project is to develop a web-based job recruiting system with implementation of sorting algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Online Programming Judge System (UOJ) by Tran , Quang Trung

    Published 2013
    “…Moreover, the mechanism of test cases generation using PSO algorithm is deeply analyzed. The study would focus on the primary structure of PSO and the proposed fitness function to calculate fitness value for each generated test case. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Development of low power viterbi decoder on complex programmable logic device platform by Abu, Mohd Azlan

    Published 2018
    “…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Development Of Generative Computer-Aided Process Planning System For Lathe Machining by Zubair, Ahmad Faiz

    Published 2019
    “…Furthermore, to minimize unit production cost, machining parameters including cutting speed (CS), feed rate (f) and depth of cut (d) were optimized for regular form surfaces by using firefly algorithm (FA). These parameters were then useful for tooling selections and tool-path planning. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An Optimized PID Parameters for LFC in Interconnected Power Systems Using MLSL Optimization Algorithm by Najeeb, Mushtaq, Shahooth, Mohammed, Mohaisen, Arrak, Ramdan, Razali, Hamdan, Daniyal

    Published 2016
    “…The conventional PID controller is developed using MLSL optimization algorithm including the LFC loop to minimize the frequency deviation and regulate the power exchange because of the load disturbance changes in area1 and area2. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…This research work has generated an algorithmic effort estimation model for function points measurement. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations by Mohd Ali, Fakariah Hani, Mahmod, Ramlan, Rushdan, Mohammad, Abdullah, Ismail

    Published 2009
    “…These modules are included in the Mixcolumn function. From the proposal of AES, the Mixcolumn function was suggested to solve the problem of delay by using look-up tables. …”
    Get full text
    Get full text
    Article
  10. 10

    Solving Boundary Value Problems for Ordinary Differential Equations Using Direct Integration and Shooting Techniques by V., Malathi

    Published 1999
    “…In this thesis, an efficient algorithm and a code BVPDI is developed for solving Boundary Value Problems (BVPs) for Ordinary Differential Equations (ODEs). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Optimization of exclusive release policies for hydropower reservoir operation by using genetic algorithm by Tayebiyan, Aida, Mohammed Ali, Thamer Ahmed, Ghazali, Abdul Halim, Abdul Malek, Marlinda

    Published 2016
    “…These policies could only use in hydropower reservoir systems. Meanwhile, to determine the optimal operation of each policy, real coded genetic algorithm is applied as an optimization technique and maximizing the total power generation over the operational periods is chosen as an objective function. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Direct Integration Block Method for Solving Higher Order Ordinary Differential Equations by Azmi, Nurul Asyikin

    Published 2010
    “…The codes were executed on UNIX operating system and the algorithms were written in C language. The numerical results showed that the performance of the developed methods gave better results in terms of total number of steps, maximum error, and total function calls compared to the existing block methods. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of gene motif modulation for information processing in artificial DNA computing by Shamsudin, Ahmad Faizul, Suhaimi, Mohd Adam, Ibrahim Ali , Noorbatcha, Hussin, Ummu Salamah, A. F., Alya Khadijah, D., Nor Hidayah

    Published 2014
    “…The results indicate improvement in the convergence of information decay between artificial and natural systems using the later method. Further development of Gene Motif binary switch in artificial DNA computing may lead to a MAS algorithm that can simulate a natural DNA computing. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A modified technique in RFID networking planning and optimization by Nawawi, Azli

    Published 2015
    “…In this research, PSO algorithm was used in the optimization process as it was considered as a very useful, efficient and well known algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Development of an intelligent multimodal biometric system for household appliances control by Abiodun musa, Aibinu

    Published 2012
    “…To this effect, a novel skin segmentation algorithm using artificial neural network (ANN) technique was developed and this was deployed to segment the palmprint and face images from the background. …”
    Get full text
    Get full text
    Get full text
    Monograph
  19. 19

    Enhancement of Over-Exposed and Under-Exposed Images Using Hybrid Gamma Error Correction Sigmoid Function by Mohd Azau, Mohd Azrin

    Published 2007
    “…This thesis combines the functions' properties and developed a hybrid algorithm to improve the quality of the poorly captured images by adjusting the contrast and compensating the gamma error. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Identification and predictive control of spray tower system using artificial neural network and differential evolution algorithm by Danzomo, Bashir A., Salami, Momoh Jimoh Eyiomika, Khan, Md. Raisuddin

    Published 2015
    “…A recurrent neural network (RNN) based on non-linear autoregressive with exogenous inputs (NARX) model has been used to develop the dynamic model of the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper