Search Results - (( developing function using algorithm ) OR ( code application using algorithm ))
Search alternatives:
- developing function »
- code application »
- using algorithm »
-
1
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…A Quick Response (QR) code is a popular type of two-dimensional barcode that is widely used in various applications. …”
Get full text
Get full text
Thesis -
2
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The development process for this simulation is using programming language of Microsoft Visual C I t 6.0 and the coding creation depends on the algorithm flowchart and the formula pseudocode. …”
Get full text
Get full text
Thesis -
3
Development of a scalable video compression algorithm
Published 2012“…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The QR code was used as a mechanism to activating the function for mobile application and determining the location, while EAN-13 barcode was used as a product identification. …”
Get full text
Get full text
Thesis -
5
Development of low power viterbi decoder on complex programmable logic device platform
Published 2018“…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
Get full text
Get full text
Get full text
Thesis -
6
Job recruiting system using sorting Algorithm / Adi Asyraf Ayob
Published 2020“…The functionality of the prototype was tested using Test Script while the usability testing was performed by collecting response from the system users about the usefulness, ease of use, and satisfaction. …”
Get full text
Get full text
Thesis -
7
A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations
Published 2009“…These modules are included in the Mixcolumn function. From the proposal of AES, the Mixcolumn function was suggested to solve the problem of delay by using look-up tables. …”
Get full text
Get full text
Article -
8
Online Programming Judge System (UOJ)
Published 2013“…Moreover, the mechanism of test cases generation using PSO algorithm is deeply analyzed. The study would focus on the primary structure of PSO and the proposed fitness function to calculate fitness value for each generated test case. …”
Get full text
Get full text
Final Year Project -
9
An Optimized PID Parameters for LFC in Interconnected Power Systems Using MLSL Optimization Algorithm
Published 2016“…The conventional PID controller is developed using MLSL optimization algorithm including the LFC loop to minimize the frequency deviation and regulate the power exchange because of the load disturbance changes in area1 and area2. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…Furthermore, to minimize unit production cost, machining parameters including cutting speed (CS), feed rate (f) and depth of cut (d) were optimized for regular form surfaces by using firefly algorithm (FA). These parameters were then useful for tooling selections and tool-path planning. …”
Get full text
Get full text
Thesis -
11
-
12
Effort Estimation Model for Function Point Measurement
Published 2007“…This research work has generated an algorithmic effort estimation model for function points measurement. …”
Get full text
Get full text
Thesis -
13
RISC-V instruction set extension on blockchain application
Published 2024“…One of the most common cryptographic algorithms used in blockchain would be selected in this paper, typically djb2 hash algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Solving Boundary Value Problems for Ordinary Differential Equations Using Direct Integration and Shooting Techniques
Published 1999“…In this thesis, an efficient algorithm and a code BVPDI is developed for solving Boundary Value Problems (BVPs) for Ordinary Differential Equations (ODEs). …”
Get full text
Get full text
Thesis -
17
A modified technique in RFID networking planning and optimization
Published 2015“…In this research, PSO algorithm was used in the optimization process as it was considered as a very useful, efficient and well known algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Optimization of exclusive release policies for hydropower reservoir operation by using genetic algorithm
Published 2016“…These policies could only use in hydropower reservoir systems. Meanwhile, to determine the optimal operation of each policy, real coded genetic algorithm is applied as an optimization technique and maximizing the total power generation over the operational periods is chosen as an objective function. …”
Get full text
Get full text
Get full text
Article -
19
Development of images segmentation using image thresholder and batch processing technique on the blood smears
Published 2022“…Finally, we've combined the code for finding circles matching image histograms and the parasite threshold detection logic into a single function to quickly examine the performance of this function on the other images using the image batch processing technique. …”
Get full text
Get full text
Get full text
Article -
20
Maze solving balbot
Published 2010“…The GP2D120 IR distance sensor is used to achieve the balancing mode while the GP2D12 IR sensor is applied as the input for microcontroller in the determination of the path control algorithm. …”
Get full text
Get full text
Undergraduates Project Papers
