Search Results - (( its implementation based algorithm ) OR ( using code using algorithm ))
Search alternatives:
- implementation based »
- its implementation »
- using algorithm »
- using code »
- code using »
-
1
Implementation of sinusoidal pulse width modulation based on cordic algorithm using silterra 0.18µm CMOS technology: article
Published 2009“…This thesis presents the implementation of Sinusoidal Pulse Width Modulation (SPWM) using Silterra 0.18µm technology and it is based on CORDIC algorithm. …”
Get full text
Get full text
Article -
2
Implementation of sinusoidal pulse width modulation based on cordic algorithm using silterra 0.18um CMOS technology / Nurul Hidayah Marzuki
Published 2009“…This thesis presents the implementation of Sinusoidal Pulse Width Modulation (SPWM) using Silterra 0.18um technology and it is based on CORDIC algorithm. …”
Get full text
Get full text
Thesis -
3
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…Motion Estimation or ME is deemed as one of the effective and popular techniques in video compression. As one of its techniques, the Block Matching Algorithm or BMA is widely employed in majority of well-known video codes due to its simplicity and high compression efficiency. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…The SPWM controller will be implemented in VLSI ASIC flow. Coordinate Rotation, Digital Computer (CORDIC), known as Volders Algorithm based on its inventor, is an algorithm that is applied to perform trigonometric related computations. …”
Get full text
Get full text
Student Project -
5
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Recent advances of whale optimization algorithm, its versions and applications
Published 2024“…The WOA was proposed by Mirjalili in 2016 and its success implement in different real-world problems. …”
Book chapter -
8
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…All these design methodologies aim to confirm the effect of HDL coding style on the performance of hardware algorithms implemented on FPGA. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi
Published 2012“…Regarding the IME of H.264/AVC, we introduce two low cost bit-serial architectures, which are based on full search (FS) algorithm due to its regularity and coding performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
10
RISC-V instruction set extension on blockchain application
Published 2024“…Towards the end of the project, the algorithms would be executed in a base RISC-V core and an extended RISC-V core using simulation tools to perform performance analysis. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code
Published 2018“…The outcome of this simulation based on random sampling from Monte Carlo N-Particle Extended (MCNPX) demonstrated that the calibration map could successfully be implemented in RPT technique to observe the dynamic movement of radioactive particle which represents the tracked media in the quadrilateral bubble column.…”
Get full text
Get full text
Get full text
Article -
12
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…The genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…However, there are very few algorithms or decision engines available that could actually be used by decision-makers to aid in the process of forming a football team. …”
Get full text
Get full text
Get full text
Thesis -
14
Fractal coding of bio-metric image for face authentication
Published 2021“…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
Get full text
Get full text
Thesis -
15
Mobile app of mood prediction based on menstrual cycle using machine learning algorithm / Nur Hazirah Amir
Published 2019“…The template design was built using Node.js and Visual Code Studio. And it used Cordova for designing interface. …”
Get full text
Get full text
Thesis -
16
Harmony search-based robust optimal controller with prior defined structure
Published 2013“…For further assessment, the proposed design strategy is then employed to design a control law for an electrical DC drive velocity controller used as a benchmark problem for the recent PSO-based and genetic algorithm optimization (GAO)-based robust controllers. …”
Get full text
Get full text
Thesis -
17
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
Get full text
Get full text
Thesis -
18
Filling and restoration of cracked digitized paintings based on preserved neighbourhood pixels
Published 2021“…The algorithm was evaluated by implementing PSNR (Peak Signal-to-noise ratio) and MSE (Mean Square error), and MATLAB was used to build the code required to process and analyze the data.…”
Get full text
Get full text
Get full text
Article -
19
Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster
Published 2018“…In this project three different data aggregation algorithms coding schemes based relative difference (CS-RD), an adaptive method of data aggregation that exploits the spatial correlation between the sensor nodes (ADAM) and coding schemes based the factor of precision (CS-FP) are evaluated. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Model-Based Design (MBD) for autonomous underwater vehicle
Published 2019“…The depth Simulink Arduino algorithm is implemented on an Arduino Mega using ModelBased Design (MBD) with MATLAB and Simulink. …”
Get full text
Get full text
Get full text
Article
