Search Results - (( java application customization algorithm ) OR ( data reduction path algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Final design of SHA-3 in this research can achieve area reduction by 12.57%, the cell count reduction by 24.35%, the critical path length reduction by 18.84%, and reduction of the clock cycles needed to generate the hash output by 75%. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Design of radix-4 single path delay fast fourier transform processor with genetic algorithms optimization by Pang, Jia Hong

    Published 2011
    “…This research work involves the implementation of Single Objective Genetic Algorithm (SOGA) and Multi-objectives Genetic Algorithm (MOGA) in a 16-point Radix-4 Single Path Delay Feedback (R4SDF) pipelined Fast Fourier Transform (FFT) processor. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal by Fadzal, Ahmad Nazmi

    Published 2017
    “…In the age of wide digital usage, text classification is one of the significant prominent attribute required in order to automatically arrange emails, articles, and other textual data in an organization. Unclassified data can lead to slower data retrieval thus a reliable method is required to effectively retrieve data efficiently and in systematic manner. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Reconfigurable enhanced path metric updater unit for Space Time Trellis Code Viterbi decoder by Abu, Mohd Azlan, Harun, Harlisya, Harmin, Mohammad Yazdi, Abdul Wahab, Noor Izzri, Rahmat, Mohd Khairil, Abd Hamid, Mohd Fairuz, Ramli, Aizat Faiz

    Published 2017
    “…Even though the Viterbi algorithm is complicated to be designed, these methods typically used large memory space to store the information that have been processed mainly at the Path Metric Updater (PMU). …”
    Get full text
    Get full text
    Article
  5. 5

    Efficient flow-based channel assignment schemes for congestion avoidance in wireless mesh networks by Abdulla Mogaibel, Hassen Abd-Almotaleb

    Published 2016
    “…AODV-RDCA is introduced to avoid the capacity reduction of high data rate links caused by low rate links when they share the same channel. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhancing quality of service in Multi-Radio Multi-Channel Wireless Mesh Networks by Raja Bongsu, Raja Hasyifah

    Published 2023
    “…These networks must effectively manage fluctuating communication traffic, signal fading, and interference. The COngestion Reduction Routing Algorithm (CORRA) tackles this challenge by evaluating link quality and interference to find optimal data paths. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    The evolution and trend of chain code scheme by Wulandhari, Lily Ayu, Haron, Habibollah

    Published 2008
    “…Chain code is widely used nowadays because it preserves information and allows considerable data reduction. The first approach for representing digital curves using chain code was introduced by Freeman in 1961, and it is known as Freeman Chain Code (FCC). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Propositional satisfiability method in rough classification modeling for data mining by Abu Bakar, Azuraliza

    Published 2002
    “…In rough set approach to data mining, the set of interesting rules are determined using a notion of reduct. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Reliable Fault Tolerant-Based Multipath Routing Model for Industrial Wireless Control Systems by Abdulrab, H., Hussin, F.A., Aziz, A.A., Awang, A., Ismail, I., Arun Mozhi Devan, P.

    Published 2022
    “…The multipath routing model has three primary paths, and each path has a backup node. The backup node stores the data transmitted by the parent node to grant communication continuity when primary nodes fail. …”
    Get full text
    Get full text
    Article
  11. 11

    Digital forensic investigation reduction model (DIFReM) for Windows 10 OS by Shayau, Yazid Haruna

    Published 2018
    “…The most important part of Digital Forensic Investigation (DFI) is the examination of data – knowing the data type and nature beforehand makes this easier. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Dynamic area coverage algorithms for static and mobile wireless sensor network environments using voronoi techniques by Ceesay, Omar M.

    Published 2011
    “…The proposed Voronoi Tessellation-based Coverage Optimization Algorithms for Static and Mobile Wireless Sensor Networks provides up to 99% coverage at various number of mobile-static sensor node combination and up to 12% reduction in average moving distance. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui by Muhammad Faisal , Siddiqui

    Published 2016
    “…Furthermore, variable databus widths are used in the data path of the proposed architecture, which leads to reducing the hardware cost and silicon area. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Development of unmanned surface vehicle with real-time water quality monitoring system by Mohamed Kassim, Anuar, Jamri, Mohd Saifuzam, Mohd Aras, Mohd Shahrieel, Ab Wahab, Norfariza, Jaya, A.K.R.A., Yasuno, Takashi

    Published 2023
    “…The USV also developed with auto navigation through all the targeted area by using GPS coordinate and path planning algorithm programmed in the USV controller. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…The scheme showed better data delivery and lower average-end-to-end delay with good flooding efficiency. …”
    Get full text
    Get full text
    Get full text
    Thesis