Search Results - (( java implication based algorithm ) OR ( level implementation during algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    The Development Of System For Algorithms Visualization Using Simjava by Jamil Alsayaydeh, Jamil Abedalrahim, Ahmad Idil, Abdul Rahman, Zainon, Maslan, Aziz, Azwan, Zikri Abadi, Baharudin, Oliinyk, Andrii

    Published 2020
    “…Moreover, algorithm visualization systems are also useful tools in algorithm engineering, particularly at several stages during the design, implementation, analysis, tuning, experimental evaluation, and presentation of the algorithms process. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization by Maizura, Ibrahim

    Published 2019
    “…However, the high-level granularity access control caused high complexity and increased the number of rules that must be checked during the authorization process, which degrade the overall authorization performance. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors by Ang, Yang Yi

    Published 2020
    “…The results show that the SV-SIP implementation can increase efficiency of side view task as compared to gaze-directed WIP implementation, and the fatigue level of SV-SIP is lower than the gaze-directed WIP implementation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique by Zamri, Muhamad Najib

    Published 2006
    “…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Boundary control of a dual-output boost converter with multilevel inverter topology / Messikh Tarek by Messikh, Tarek

    Published 2017
    “…Steady state characteristics and large signal stability analysis are carried out for the DOBC, the sensorless control algorithm is implemented in TMS320F2812. A three-level algorithm of SVPWM is implemented in Altera DE2 board to control the three-level inverter which ensures lower hardware resource usage and satisfy the switching time criteria. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    DC-link capacitor voltage regulation for three-phase three-level inverter-based shunt active power filter with inverted error deviation control by Yap, Hoon, Mohd Radzi, Mohd Amran, Hassan, Mohd Khair, Mailah, Nashiren Farzilah

    Published 2016
    “…To validate effectiveness and feasibility of the proposed algorithm, simulation work in MATLAB-Simulink and experimental implementation utilizing a TMS320F28335 Digital Signal Processor (DSP) are performed. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Design and Implementation of Advanced Encryption Standard Using Verilog HDL by Shamsiah, Suhaili, Rene Brooke, Fredrick, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2020
    “…One of the main concerns involving software implementation of encryption algorithm is the possibility of slower processing when transmitting and receiving data which consequently will encounter low security level during process of encryption for real-time application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Real-Time Implementation Of LPC-10 Codec On TMS320C6713 DSP by Talib Alshammari, Wissam

    Published 2012
    “…During last two decades various speech coding algorithms have been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A novel Master–Slave optimization algorithm for generating an optimal release policy in case of reservoir operation by Turgut, Mert Sinan, Turgut, Oguz Emrah, Afan, Haitham Abdulmohsin, El-Shafie, Ahmed

    Published 2019
    “…In addition, two different optimization algorithms, namely crow search algorithm and master–slave algorithm, have been introduced to generate an optimal rule for water release policy. …”
    Get full text
    Get full text
    Article
  13. 13

    Establishment of perez du-mortier calibration algorithm as a sunphotometers calibration protocol at a altitude above sea level by Nur Hasinah Najiah Maizan

    Published 2017
    “…Recently, near sea level Langley calibration method for ground based measurement was developed by combining Perez Du- Mortier (PDM) algorithm with statistical filter. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Design and implementation of advanced encryption standard using verilog HDL by Shamsiah, Suhaili, Fredrick, Rene Brooke, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2022
    “…One of the main concerns involving software implementation of encryption algorithm is the possibility of slower processing when transmitting and receiving data which consequently will encounter low security level during process of encryption for real-time application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Diagnosis of acne vulgaris on face using fuzzy expert system / Nur Sabrina Anuar by Anuar, Nur Sabrina

    Published 2017
    “…Thus, it can save time and cost to diagnose acne. The FES algorithm will process five input fields such as cysts, nodules, papules, pustules and comedones, and then produced one output fields which is the level of severity of acne. …”
    Get full text
    Get full text
    Thesis
  18. 18

    AN INVESTIGATION OF INDOOR LOCALIZATION BASED ON WI-FI FOR MOBILE USER by NOORMISLAN, HAMIM AKMAL IKHTIARUDIN

    Published 2019
    “…All the indoor positioning methods are studied and analyzed according to their implementation and level of accuracy. After the observation is done, the fingerprinting method is selected to be implemented in this project with the measurement of received signal strength (RSS) of all available access points. …”
    Get full text
    Get full text
    Final Year Project
  19. 19
  20. 20