Search Results - (( integer implementation using algorithm ) OR ( _ implementation developing algorithm ))

Refine Results
  1. 1

    Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture by Chang, Boon Chiao

    Published 2018
    “…Hence, other contemporary processor architectures such as GPU and FPGA have become popular alternative to speed up the computation in recent years.This dissertation first discusses several existing large integer multiplication algorithms and reviews different methods used to implement thediscussed algorithms done by other researchers in both Graphic Processing Unit (GPU) and Field Programmable Gate Array (FPGA).Compared to GPU, FPGA offered more low level design and development to the implementation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…The RSA algorithm can be used for both public key encryption and digital signatures. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Development of symbolic algorithms for certain algebraic processes by Abd. Rahman, Ali, Aris, Nor'Aini

    Published 2007
    “…From a general algorithm using the comrade matrix approach, the nonmodular and modular techniques are prescribed. …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Development of symbolic algorithms for certain algebraic processes by Abd. Rahman, Ali, Aris, Nor'aini

    Published 2007
    “…From a general algorithm using the comrade matrix approach, the nonmodular and modular techniques are prescribed. …”
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Triangular Coordinate Extraction (TCE) technique has also been introduced to extract the coordinates during the rotation of Hybrid Cube surface (HCs) and plays an important role in the development of KSAHC algorithm. The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Modification of particle swarm optimization algorithm for optimization of discrete values by Mohd Yassin, Ahmad Ihsan, Jusoh, Muhammad Huzaimy, Abdul Rahman, Farah Yasmin

    Published 2011
    “…Stochastic optimization algorithms are a new breed of optimizers that have recently been developed. …”
    Get full text
    Get full text
    Research Reports
  7. 7

    A hybrid of integer differential bees and flux balance analysis for improving succinate and lactate production by Arieef, Mohd Fahmi, Yee, Wen Choon, Mohamad, Mohd Saberi, Deris, Safaai, Napis, Suhaimi, Kasim, Shahreen

    Published 2017
    “…To increase the yield of the production, gene knockout technique was implemented in various hybrid optimization algorithms. …”
    Get full text
    Get full text
    Article
  8. 8

    A hybrid of integer differential bees and flux balance analysis for improving succinate and lactate production by Arieef, Mohd Fahmi, Kasim, Shahreen, Yee, Wen Choon, Mohamad, Mohd Saberi, Deris, Safaai, Napis, Suhaimi, Kasim, Shahreen

    Published 2017
    “…To increase the yield of the production, gene knockout technique was implemented in various hybrid optimization algorithms. …”
    Get full text
    Get full text
    Article
  9. 9

    Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems by Uvaraja, Vikneswary

    Published 2018
    “…Additionally, the MTS algorithm is also implemented in parallel computing to produce parallel MTS for generating comparable solutions in shorter computational times. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results by Fouziah Md Yassin, Ag Asri Ag Ibrahim, Zaturrawiah Ali Omar, Saturi Baco

    Published 2015
    “…The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
    Get full text
    Get full text
    Research Report
  11. 11

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…Besides, these algorithms more frequently implemented with the lengthy and redundant fixed N length integer encoding. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Reverse logistics network optimizing by genetic algorithm: a case study of automotive wiring harnesses by Sadrnia, Abdolhossein, Ismail, Napsiah, Mohd Ariffin, Mohd Khairol Anuar, Zulkifli, Norzima, Boyer, Omid

    Published 2014
    “…With regards to the complexity of the reverse logistics network, traditional method cannot be implemented for solving them. Thus, an evolutionary algorithm based genetic algorithm (GA) is applied as a solution methodology to solve mixed integer linear programming model and find the optimum solution. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End by Tan Yin Keong, Tan Yin

    Published 2012
    “…We implement a branch-and-contract algorithm that aims at reducing the size of the search region. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End by Tan , Yin Keong

    Published 2009
    “…We implement a branch-and-contract algorithm that aims at reducing the size of the search region. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16
  17. 17

    AI recommendation penetration testing tool for SQL injection: linear regression by Ahmad Fuad, Norshahira Elliyana, Saad, Shahadan

    Published 2025
    “…This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Solving a multi-period inventory routing problem with stochastic unstationary demand rates by Muhammad Khodri Harahap, Afif Zuhri

    Published 2022
    “…The computational results show that the algorithms that implement this modified formulation can achieve a better optimization result. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20