Search Results - (( java implementation phase algorithm ) OR ( using function design algorithms ))
Search alternatives:
- implementation phase »
- java implementation »
- phase algorithm »
- using function »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
3
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
5
OPTIMAL DESIGN OF A BLDC MOTOR BY GENETIC ALGORITHM
Published 2007“…The project report describes an optimal design of Brushless DC (BLDC) motor using Genetic Algorithm (GA) and Simulated Annealing (SA). …”
Get full text
Get full text
Final Year Project -
6
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
7
Design of low order quantitative feedback theory and H-infinity-based controllers using particle swarm optimisation for a pneumatic actuator system
Published 2010“…The PSO algorithm is used to minimize the infinity norm of the transfer function of the nominal closed loop system to obtain the optimal parameters of the weighting functions. …”
Get full text
Get full text
Thesis -
8
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…Basically, it is used for message digest. RIPEMD-160 is one of the algorithms in hash function that can improve the security in storing information. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
10
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…In the previous Intel Microelectronic SHA-3 design, the synthesized area of the design is large due to many intermediate states and logics of the step mapping functions. …”
Get full text
Get full text
Thesis -
11
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…The main objective of this research is to formulate unfolding transformation factor 2 and factor 4 methods into hash function design. Additionally, low-power design techniques using state encoding in hash function design also need to be considered. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
Get full text
Get full text
Final Year Project -
13
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Proceeding -
14
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Proceeding -
15
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
16
Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah
Published 1997“…The objective of this project is to build Optimal Layout of CMOS Functional Arrays 1C standard cell design. Firstly, this report is discussed about the Optimal Layout of CMOS Functional of CMOS functional array. …”
Get full text
Get full text
Thesis -
17
DESIGN OF IMPROVED GRID FOR TURTLE ROBOT
Published 2013“…This is the followed by developing improved grid design with new algorithm which is then tested continuously to ensure its functionality working flawlessly. …”
Get full text
Get full text
Final Year Project -
18
A modified flower pollination algorithm and carnivorous plant algorithm for solving engineering optimization problem
Published 2021“…Both MFPA and CPA were first evaluated using twenty-five well-known benchmark functions with different characteristics and seven Congress on Evolutionary Computation (CEC) 2017 test functions. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Position control of robot manipulator: Design a novel SISO adaptive sliding mode fuzzy PD fuzzy sliding mode control.
Published 2011“…To attenuate the chattering phenomenon this method developed a linear boundary layer and the parameter of the sliding function is online tuned by adaptation laws. This algorithm will be analyzed and evaluated on robotic manipulators and design adaption laws of adaptive algorithms after that writing Lyapunov function candidates and prove the asymptotic convergence of the closed-loop system using Lyapunov stability theorem mathematically. …”
Get full text
Get full text
Article -
20
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Get full text
Article
