Search Results - (( integer implementation using algorithm ) OR ( java implementation level algorithm ))

Refine Results
  1. 1

    Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture by Chang, Boon Chiao

    Published 2018
    “…Both radix-2 and radix-4 FNT modules are implemented and a further design of radix-4 FNT module, named radix-4 CTFNT module that is optimized to fit the multiplication algorithm we used is proposed. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    ZOT -Mk: A New Algorithm For Big Integer Multiplication by Jahani, Shahram

    Published 2009
    “…Since the multiplication on integers is not native to the computer architecture numbering structure of bits and bytes, such algorithms are bound to be a bit slower on the implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Surveillance camera placement optimization using Particle Swarm Optimization (PSO) algorithm and Mixed-Integer Linear Programming (MILP) model / `Ain Safia Roslan by Roslan, `Ain Safia

    Published 2024
    “…This project explores the optimization of surveillance camera placements using Particle Swarm Optimization (PSO) and Mixed-Integer Linear Programming (MILP). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Projecting image on non-planar surface with zero-th order geometric continuity using simple dual-linear function and manipulation of strict integer implementation in programming la... by Yusoff, Fakhrul Hazman, Azhar, Muhammad Amirul

    Published 2015
    “…Usage of a projection system to display large screen images is still relevant in the midst of LED-based display increasing popularity.This is due to that the system itself is a mature technology, reliable and cheaper than the LED counterpart.While various methods had addressed the projection problems on curve surface, projecting image on jagged like surface (zero order geometric continuity) has yet to be studied in depth.This paper proposes a method for projecting image on non-planar surface with zero-order geometric continuity property using parametric modeling.The method manipulate linear function by combining two functions into one by taking advantage of computer programs strict implementation of integer variables.The method was applied to grid-based texturing algorithm in order to create the desired zero-continuity effect on the surface.The method was compared with texturing that implement existing curve algorithm to project image on the screen.Visual evaluation results showed that the proposed method fared better compared to existing curve-based projection algorithm.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Solving Sudoku puzzles in Binary Integer Linear Programming using Branch and Bound algorithm / Ahida Waliyyah Ahmad Fuad by Ahmad Fuad, Ahida Waliyyah

    Published 2024
    “…This study explores the application of a Binary Integer Linear Programming (BILP) model combined with the Branch and Bound (B&B) algorithm to solve Sudoku puzzles. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A hybrid of integer differential bees and flux balance analysis for improving succinate and lactate production by Arieef, Mohd Fahmi, Kasim, Shahreen, Yee, Wen Choon, Mohamad, Mohd Saberi, Deris, Safaai, Napis, Suhaimi, Kasim, Shahreen

    Published 2017
    “…To increase the yield of the production, gene knockout technique was implemented in various hybrid optimization algorithms. …”
    Get full text
    Get full text
    Article
  11. 11

    A hybrid of integer differential bees and flux balance analysis for improving succinate and lactate production by Arieef, Mohd Fahmi, Yee, Wen Choon, Mohamad, Mohd Saberi, Deris, Safaai, Napis, Suhaimi, Kasim, Shahreen

    Published 2017
    “…To increase the yield of the production, gene knockout technique was implemented in various hybrid optimization algorithms. …”
    Get full text
    Get full text
    Article
  12. 12

    FPGA-based hardware implementation of optical flow constraint equation of Horn and Schunck by Rustam, Ruzali, Hamid, Nor Hisham, Hussin, Fawnizu Azmadi

    Published 2012
    “…In hardware implementation, there are different architectures that can represent the same algorithm into hardware. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Hardware architecture of OFCE-HS for hardware implementation by Rustam, Ruzali, Hamid, Nor Hisham, Hussin, Fawnizu Azmadi

    Published 2011
    “…To overcome this problem, new proposed hardware architecture of OFCE-HS is presented in this paper. With calculations using a combination of integer and fractional arithmetic, it is possible to reduce the number of dividers and to improve its performance. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Modification of particle swarm optimization algorithm for optimization of discrete values by Mohd Yassin, Ahmad Ihsan, Jusoh, Muhammad Huzaimy, Abdul Rahman, Farah Yasmin

    Published 2011
    “…The DPSO was benchmarked against the methods in [5-8) using the Seven Integer Programming (SIP) test suite [8). …”
    Get full text
    Get full text
    Research Reports
  16. 16

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Fpga Implementation Of Metaheuristic Optimization Algorithm by Phuah, Soon Eu

    Published 2022
    “…The Discrete SKF was then modelled using behavioural modelling to produce the Binary SKF which was then implemented onto FPGA. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  19. 19

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…By using the three-dimensional hybrid cube in KSAHC transformation, encryption keys are represented as n × n × n matrix of integer numbers and used in the development of the permutation and substitution of order 4 square matrix. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article