Search Results - (( development among coding algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- development among »
- coding algorithm »
- java application »
- among coding »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…The initial investigation on the existing LDPC code decoding algorithms assists to develop a low complexity LDPC code decoding algorithm. …”
Get full text
Get full text
Get full text
Thesis -
3
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
4
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
5
Investigation of block matching algorithm for video coding
Published 2013“…The Spatial model exploits the redundancy in a single video frame (I frame) while the temporal model exploits the redundancy among frames (P frame). The temporal model deals with motion estimation (ME) and motion compensation (MC) algorithm with the matching technique called “Block Matching Algorithm” (BMA) to produce the next encoded video frame with motion vector. …”
Get full text
Get full text
Get full text
Thesis -
6
A Comparison Study of LDPC and BCH Codes
Published 2006“…Therefore, the LDPC and BCH codes were developed for achieving more reliable data transmission in communication systems. …”
Get full text
Get full text
Final Year Project -
7
Handheld devices 3D video streaming compression algorithm / Mohamad Taib Miskon, Hamidah Jantan and Wan Ahmad Khusairi Wan Chek
Published 2016“…In recent years, a Three Dimensional Discrete Cosine Transform (3D-DCT) coding algorithm has been developed for compression of still 3D integral images [8-10], The main benefit of using transform coding is that integral 3D images are inherently divided into small non-overlapping…”
Get full text
Get full text
Research Reports -
8
Computational simulation for static and dynamic load of rectangular plate in elastic region for analysis of impact resilient structure.
Published 2012“…Through such analysis and numerical simulation, effort is devoted to arrive at optimum configuration in terms of loading, structural dimensions, and material properties, among others. The codes developed are validated for generic cases. …”
Get full text
Get full text
Conference or Workshop Item -
9
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
10
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
An event-driven simulation for highest urgency first (HUF) : a latency and modulation aware bandwidth allocation algorithm for WiMAX base stations.
Published 2013“…This research has focused at developing a discrete-event simulator to implement bandwidth allocation algorithms for a WiMAX base station.The highest urgency first algorithm has been utilized as a benchmark deployment algorithm in order to provide: dynamic downlink/uplink adjustment and latency guarantee for real-time applications. …”
Get full text
Get full text
Article -
12
-
13
Why coding? Why now? From coding to computational thinking through computational mathematics problem based learning (CM-PBL)
Published 2019“…This fact is reflected in the recent implementation of computer coding in the Malaysia’s school curriculum to nurture 21st century skills among students. …”
Get full text
Get full text
Conference or Workshop Item -
14
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
Published 2004“…Doing arithmetic in finite field is the key part to the implementation of communication and coding system including the newly developed Rijndael the Advanced Encryption Standard (AES). …”
Get full text
Get full text
Thesis -
15
Design and analysis of high performance and low power matrix filling for DNA sequence allignment accelerator using ASIC design flow / Nurul Farhana Abd Razak
Published 2010“…Among them Smith-Waterman (S-W) is the most sensitive (accurate) algorithm. …”
Get full text
Get full text
Student Project -
16
A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations
Published 2009“…Doing arithmetic in finite field is the key part to the implementation of communication and coding system including the newly developed Rijndael the Advanced Encryption Standard (AES). …”
Get full text
Get full text
Article -
17
Development and characterization of anonymous nuclear markers to determine genetic variation in two groupers species and their hybrids
Published 2015“…This study set forth to overcome this limitation by developing the second generation of non-coding non informative anonymous nuclear markers (ncni-ANM) for subsequent genetic characterization of Fl grouper hybrids. …”
Get full text
Get full text
Get full text
Thesis -
18
Computational simulation for analysis and synthesis of impact resilient structure
Published 2013“…The first objective of the work is to develop a computational algorithm to analyze flat plate as a generic structure subjected to impact loading for numerical simulation and parametric study. …”
Get full text
Get full text
Article -
19
Optimization of exclusive release policies for hydropower reservoir operation by using genetic algorithm
Published 2016“…Meanwhile, to determine the optimal operation of each policy, real coded genetic algorithm is applied as an optimization technique and maximizing the total power generation over the operational periods is chosen as an objective function. …”
Get full text
Get full text
Get full text
Article -
20
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…Numerous data security and hiding algorithms have been developed in the last decade. Online attacks have increased to a large extent nowadays and the most common attack among them is data abuse . …”
Get full text
Get full text
Student Project
