Search Results - (( its implementation based algorithm ) OR ( using code using algorithm ))

Refine Results
  1. 1

    Implementation of sinusoidal pulse width modulation based on cordic algorithm using silterra 0.18µm CMOS technology: article by Marzuki, Nurul Hidayah, Saparon, Azilah

    Published 2009
    “…This thesis presents the implementation of Sinusoidal Pulse Width Modulation (SPWM) using Silterra 0.18µm technology and it is based on CORDIC algorithm. …”
    Get full text
    Get full text
    Article
  2. 2

    Implementation of sinusoidal pulse width modulation based on cordic algorithm using silterra 0.18um CMOS technology / Nurul Hidayah Marzuki by Marzuki, Nurul Hidayah

    Published 2009
    “…This thesis presents the implementation of Sinusoidal Pulse Width Modulation (SPWM) using Silterra 0.18um technology and it is based on CORDIC algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique by Hamid, Nurul 'Atiqah

    Published 2016
    “…Motion Estimation or ME is deemed as one of the effective and popular techniques in video compression. As one of its techniques, the Block Matching Algorithm or BMA is widely employed in majority of well-known video codes due to its simplicity and high compression efficiency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy by Madzzaini, Nur Sofea Eleena

    Published 2017
    “…The SPWM controller will be implemented in VLSI ASIC flow. Coordinate Rotation, Digital Computer (CORDIC), known as Volders Algorithm based on its inventor, is an algorithm that is applied to perform trigonometric related computations. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Recent advances of whale optimization algorithm, its versions and applications by Alyasseri Z.A.A., Ali N.S., Al-Betar M.A., Makhadmeh S.N., Jamil N., Awadallah M.A., Braik M., Mirjalili S.

    Published 2024
    “…The WOA was proposed by Mirjalili in 2016 and its success implement in different real-world problems. …”
    Book chapter
  8. 8

    Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application by SHAMSIAH BINTI, SUHAILI

    Published 2025
    “…All these design methodologies aim to confirm the effect of HDL coding style on the performance of hardware algorithms implemented on FPGA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi by Hosseiny Fatemi, Mohammad Reza

    Published 2012
    “…Regarding the IME of H.264/AVC, we introduce two low cost bit-serial architectures, which are based on full search (FS) algorithm due to its regularity and coding performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…Towards the end of the project, the algorithms would be executed in a base RISC-V core and an extended RISC-V core using simulation tools to perform performance analysis. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code by Mohd Yunos, Mohd Amirul Syafiq, Anak Usang, Mark Dennis, Ithnin, Hanafi, Hussain, Siti Aslina, Mohamed Yusoff, Hamdan, Sipaun, Susan

    Published 2018
    “…The outcome of this simulation based on random sampling from Monte Carlo N-Particle Extended (MCNPX) demonstrated that the calibration map could successfully be implemented in RPT technique to observe the dynamic movement of radioactive particle which represents the tracked media in the quadrilateral bubble column.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES) by Kamal Khairi Supaprhman

    Published 2022
    “…The genetic algorithm was widely used because of its accuracy and simplicity. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players by Mohammad Zukuwwan, Zainol Abidin

    Published 2021
    “…However, there are very few algorithms or decision engines available that could actually be used by decision-makers to aid in the process of forming a football team. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Mobile app of mood prediction based on menstrual cycle using machine learning algorithm / Nur Hazirah Amir by Amir, Nur Hazirah

    Published 2019
    “…The template design was built using Node.js and Visual Code Studio. And it used Cordova for designing interface. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Harmony search-based robust optimal controller with prior defined structure by Rafieishahemabadi, Ali

    Published 2013
    “…For further assessment, the proposed design strategy is then employed to design a control law for an electrical DC drive velocity controller used as a benchmark problem for the recent PSO-based and genetic algorithm optimization (GAO)-based robust controllers. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Filling and restoration of cracked digitized paintings based on preserved neighbourhood pixels by Farajalla Ali, Nawafil Abdulwahab, Alshaikhli, Imad Fakhri Taha

    Published 2021
    “…The algorithm was evaluated by implementing PSNR (Peak Signal-to-noise ratio) and MSE (Mean Square error), and MATLAB was used to build the code required to process and analyze the data.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster by Ali, Wala'a Hussein

    Published 2018
    “…In this project three different data aggregation algorithms coding schemes based relative difference (CS-RD), an adaptive method of data aggregation that exploits the spatial correlation between the sensor nodes (ADAM) and coding schemes based the factor of precision (CS-FP) are evaluated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Model-Based Design (MBD) for autonomous underwater vehicle by Mohd Aras, Mohd Shahrieel, Aripin, Muhamad Khairi, Bahar, Mohd Bazli, Tan, Wei Chiang, Ooh, Man Chun, Ho, Gui Yan, Lim, Zhi Han

    Published 2019
    “…The depth Simulink Arduino algorithm is implemented on an Arduino Mega using ModelBased Design (MBD) with MATLAB and Simulink. …”
    Get full text
    Get full text
    Get full text
    Article