Search Results - (( java implication based algorithm ) OR ( integer implementation design algorithms ))

Refine Results
  1. 1

    Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture by Chang, Boon Chiao

    Published 2018
    “…Both radix-2 and radix-4 FNT modules are implemented and a further design of radix-4 FNT module, named radix-4 CTFNT module that is optimized to fit the multiplication algorithm we used is proposed. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Fpga Implementation Of Metaheuristic Optimization Algorithm by Phuah, Soon Eu

    Published 2022
    “…There is a surge of novel metaheuristics proposed recently, however it is uncertain whether they are suitable for FPGA implementation. In addition, there exists a variety of design methodologies to implement metaheuristics upon FPGA which may improve the performance of the implementation. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    FPGA implementation of variable precision Euclid’s GCD algorithm by Al-Haija, Qasem Abu, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Alfarran, Islam

    Published 2017
    “…Finally, comparisons with previous designs/implementations illustrate that the proposed coprocessor implementation is faster than many reported state-of-the-art solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    FPGA implementation of metaheuristic optimization algorithm by Nurul Hazlina, Noordin, Phuah, Soon Eu, Zuwairie, Ibrahim

    Published 2023
    “…There is a surge of novel metaheuristics proposed recently, however it is uncertain whether they are suitable for FPGA implementation. In addition, there exists a variety of design methodologies to implement metaheuristics upon FPGA which may improve the performance of the implementation. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    FPGA-based hardware implementation of optical flow constraint equation of Horn and Schunck by Rustam, Ruzali, Hamid, Nor Hisham, Hussin, Fawnizu Azmadi

    Published 2012
    “…In hardware implementation, there are different architectures that can represent the same algorithm into hardware. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Hardware architecture of OFCE-HS for hardware implementation by Rustam, Ruzali, Hamid, Nor Hisham, Hussin, Fawnizu Azmadi

    Published 2011
    “…Attempts to implement OFCE-HS into real-time hardware have been performed by researchers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    The Construction Of Quantum Block Cipher For Grover Algorithm by Eid, Almazrooie Mishal

    Published 2018
    “…Asymmetric cryptographic algorithms which are based on integer factorization or discrete logarithms problems are rendered unsecured against quantum attacks. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results by Fouziah Md Yassin, Ag Asri Ag Ibrahim, Zaturrawiah Ali Omar, Saturi Baco

    Published 2015
    “…The result is rounded to the nearest integer for divisors of 3, 5, 6, 7 and 9. The methodology of this research are involving design specification, high level design using C++, RTL level description using Verilog, functional verification and logic synthesis using two different technology library. …”
    Get full text
    Get full text
    Research Report
  11. 11

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Development of symbolic algorithms for certain algebraic processes by Abd. Rahman, Ali, Aris, Nor'Aini

    Published 2007
    “…The main objective of the study is to design and implement an effective and efficient symbolic algorithm for the general class of dense polynomials, given the rational number defining terms of their basis. …”
    Get full text
    Get full text
    Get full text
    Monograph
  13. 13

    Development of symbolic algorithms for certain algebraic processes by Abd. Rahman, Ali, Aris, Nor'aini

    Published 2007
    “…The main objective of the study is to design and implement an effective and efficient symbolic algorithm for the general class of dense polynomials, given the rational number defining terms of their basis. …”
    Get full text
    Get full text
    Get full text
    Monograph
  14. 14
  15. 15

    Hardware Acceleration of Window Big-Digit (Wbd) Multiplication for Embedded Applications by Lim, Ee Wah

    Published 2015
    “…In this study, the hardware implementation of wBD multiplier is designed using Verilog and prototyped in FPGA platform. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Key generation technique based on triangular coordinate extraction for hybrid cubes by Mushtaq, Muhammad Faheem, Jamel, Sapiee, Mohamad, Kamaruddin Malik, Ahmad Khalid, Shamsul Kamal, Mat Deris, Mustafa

    Published 2017
    “…The overall security of HC is improved by the rotation of HCs and enhanced the complexity in the design of key schedule algorithm. The brute force and entropy test are applied in experimental results which proved that the proposed technique is suitable for implementing a key generation technique and free from any predicted keys pattern.…”
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    A study on the significance of backlash width values to the performance of the MIQP-based design of MPC by H., Zabiri, Y., Samyudia

    Published 2005
    “…Simulation results via an industrial Fluidized Catalytic Cracking Unit (FCCU) case study are presented to show the significance of precise estimation of the backlash width in ensuring successful implementation of the MIQP-based design of MPC.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20