Search Results - (( java implementation graph algorithm ) OR ( using programme gets algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…In the benchmark paper, the result of implementation of LACE algorithm in 400, 600, 800 and 1000 servers were plotted at different graphs. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Design and analysis of high performance matrix filling for DNA sequence alignment accelerator using asic design flow: article / Nurzaima Mahmod by Mahmod, Nurzaima

    “…In the advanced engineering technology, the massive parallelism can be implemented by using the Field Programmable Logic Array (FPGA) techniques. …”
    Get full text
    Get full text
    Article
  5. 5

    Design and analysis of high performance matrix filling for DNA sequence alignment accelerator using ASIC design flow / Nurzaima Mahmod by Mahmod, Nurzaima

    Published 2010
    “…In the advanced engineering technology, the massive parallelism can be implemented by using the Field Programmable Logic Array (FPGA) techniques. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Hardware And Software Partitioning Using Genetic Algorithm In Image Processing Application by Loo, Fang Hean

    Published 2018
    “…The framework for HW-SW Partitioning using Genetic Algorithm (GA) is developed in MATLAB. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Design and Implementation of Advanced Encryption Standard Using Verilog HDL by Shamsiah, Suhaili, Rene Brooke, Fredrick, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2020
    “…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A cluster analysis of population based cancer registry in Brunei Darussalam : an exploratory study by Lai, Daphne Teck Ching, Owais A. Malik

    Published 2022
    “…The top three prevalent cancers associated with these subgroups were consistently identified using the three algorithms. Upon comparing the subgroups’ ages during diagnosis, we identify possible screening behaviours of specific subgroups, suggesting for early screening awareness programmes. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Design and implementation of advanced encryption standard using verilog HDL by Shamsiah, Suhaili, Fredrick, Rene Brooke, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2022
    “…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Leaf condition analysis using convolutional neural network and vision transformer by Yong, Wai Chun, Ng, Kok Why, Haw, Su Cheng, Naveen, Palanichamy, Ng, Seng Beng

    Published 2024
    “…As a result, although customers may receive an excellent interactive features programme, the backend algorithm is not optimized. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    A Malay Chatterbot by Lokman, Aina Fatiha

    Published 2005
    “…AIML is open source software, a great advantage for the project since the software can be freely used and, if necessary, modified. The simplicity of AIML makes it easy for non-programmers, especially those who already knowHTML, to get started writing chat robots.…”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of low cost 3D scanner (LC3S) using Matlab and FPGA / Abdul Rais Abdul Rahim ...[et al.] by Abdul Rahman, Abdul Rais, Abdol Rahman, Mohd Adli, Ramli, Muhammad Azizi, Saparon, Azilah

    Published 2018
    “…Triangulation algorithm is applied and a software for scanning and improving the image is developed using MATLAB. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Interview was conducted to get an overview of programming experts towards using Hybrid Obfuscation Technique to prevent prohibited Reverse Engineering. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA by Ahmed, Shakil

    Published 2013
    “…Also the parallel AES-XTS encryption and decryption design were used to develop integrated chip of AES-XTS on FPGA. …”
    Get full text
    Get full text
    Thesis