Search Results - (( developing implementation function algorithm ) OR ( data integration based algorithm ))

Refine Results
  1. 1
  2. 2

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Hub Angle Control for A Single Link Flexible Manipulator Based on Cuckoo Search Algorithm by aiman Azrael, Shaiful Nahar Sukri, Siti Sarah Zahidah, Nazri, Muhamad Sukri, Hadi, Annisa, Jamali, Hanim, Mohd Yatim, Intan Zaurah, Mat Darus

    Published 2021
    “…This paper presents the development of a Proportional-IntegralDerivative controller based on cuckoo search algorithm for a single link flexible manipulator system. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  6. 6

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Optimal demand response of solar energy generation using Genetic Algorithm / Muhammad Asyraaf Adlan by Adlan, Muhammad Asyraaf

    Published 2025
    “…The method involves collecting data from the solar energy project of UiTM Kampus Dungun, implementing GA for optimization, and evaluating its performance based on the fitness value and convergence trends. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Article
  9. 9

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai, Asrani, Lit, Maimun Binti, Huja Hussin, Mohamad Faizrizwan bin, Mohd Sabri

    Published 2022
    “…Several cryptographic SHA-256 hash algorithms have been developed to enhance the performance of data-protection techniques. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  11. 11

    Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg by Zakaria, Yuslina

    Published 2006
    “…This research presents the integration of ontology and metabolic pathway prediction algorithm as a possible solution for predicting metabolic pathways. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Security framework based multi agent system architecture to facilitate data fetching from cloud data storage by Mohamed, Amir Mohamed Talib

    Published 2012
    “…GSecaaS is quantitatively and qualitatively evaluated to determine the most appropriate security policies to the development of cloud security algorithm. Based on the evaluation of the post-survey, GSecaaS has been developed. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…WebDID is an alternative method to protect web server by detecting unauthorised changes in web and sending an intrusion alarm directly to web server administrator. Hashing function implementation have been using in this system as its cryptography algorithm. …”
    Get full text
    Get full text
    Monograph
  16. 16
  17. 17

    Neural network modeling and optimization for spray-drying coconut milk using genetic algorithm and particle swarm optimization by Lee, Jesee Kar Ming

    Published 2022
    “…Firstly, using MATLAB program, the ANN model is developed based on optimized topology and is then furthered optimized by genetic algorithm (GA) and particle swarm optimization (PSO) using MINITAB program. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph
  19. 19

    An autonomous wheelchair speed control using fuzzy logic controller / Muhammad Ashraf Mohamad Ghazali by Mohamad Ghazali, Muhammad Ashraf

    Published 2025
    “…Future enhancements could involve integrating additional sensors and refining the control algorithm for enhanced performance in real-world applications.…”
    Get full text
    Get full text
    Thesis
  20. 20

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…This research focuses on developing a novel path planning algorithm, called Generalized Laser Simulator (GLS), to solve the path planning problem of mobile robots in a constrained environment. …”
    Get full text
    Thesis