Search Results - (( java implementation during algorithm ) OR ( programmes based data algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- during algorithm »
- programmes based »
- data algorithm »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri
Published 2017“…Some applicants who enrolled for unsuitable programme ended up failed to progress or dropped out from the programme. …”
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
4
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
5
Agent-based extraction algorithm for computational problem solving
Published 2015“…With such results, it can be concluded that our proposed agent-based tool is able to help novice programmer in CPS.…”
Get full text
Get full text
Thesis -
6
Prediction of MUET result based on KNN algorithm / Siti Fatimah Azzahra Hamrizan
Published 2021“…Some additional future works should be applied to improve the algorithm performance are to add more data, use other related results as the features and compare the KNN algorithm to other algorithm.…”
Get full text
Get full text
Thesis -
7
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
Design and implementation of real data fast fourier transform processor on field programmable gates array
Published 2015“…In this work, the memorybased FFT processor, based on radix-4 FFT algorithm is implemented on Cyclone II Field Programmable Gates Array (FPGA). …”
Get full text
Get full text
Thesis -
9
Making programmer effective for software development teams: An extended study
Published 2017“…In order to find the possible combination of personality types between team-leader and programmer, this study applied Genetic Algorithm (GA) and Johnson's Algorithm (JA) on data. …”
Get full text
Get full text
Article -
10
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
Improved genetic algorithm for direct current motor high speed controller implemented on field programmable gate array
Published 2019“…There are many researches have been done to optimize PI controller based evolutionary algorithm, such as Genetic Algorithm (GA). …”
Get full text
Get full text
Thesis -
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Cluster analysis is one of the data mining task that are widely used in many area to extracting, grouping data with similar attribute in order to uncover the hidden pattern and meaning in the data. …”
Get full text
Get full text
Thesis -
14
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
15
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
16
An FPGA implementation and performance analysis between radix-2 and radix-4 of 4096 point FFT
Published 2018“…The entire algorithm designed by Altera Quartus II and synthesis for Altera DE2-70 field programmable gate arrays (FPGA) board, in order to investigate and determine the desired algorithm based on the application used for and the system requirement.…”
Get full text
Get full text
Conference or Workshop Item -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
18
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
A cluster analysis of population based cancer registry in Brunei Darussalam : an exploratory study
Published 2022“…Four clustering algorithms are explored in the cluster analysis of Brunei Darussalam Cancer Registry; Two-step, Partitional Around Medoid, Agglomerative Hierarchical and Model-based. …”
Get full text
Get full text
Get full text
Article
