Search Results - (( java implication based algorithm ) OR ( level implementation some algorithm ))*

Refine Results
  1. 1

    Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul by Tom´As, Maul

    Published 2006
    “…At the algorithmic level, several approaches for solving the pose estimation problem are compared in terms of their neural implementability. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    ANALYSIS AND INTERPRETATION OF PRESSURE TRANSIENT TEST DATA BY RECENT ROBUST DECONVOLUTION METHODS by Mohd Mustafa, Muhammad Izzatullah

    Published 2013
    “…Recently, the robust deconvolution algorithms that tolerate high levels of errors in pressure and rate than the previous deconvolution algorithms have been introduced in the literature. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Development of heuristic task scheduling algorithm in cloud computing by Diallo, Laouratou, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke

    Published 2016
    “…The proposed algorithm is followed by a discussion in order to make smoother the implementation. …”
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…Per Hob Behavoiurs (PHBs) are implemented at DiffServ networks nodes using some scheduling and queuing mechanisms that are predecessor by markers and shaper. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…Finally, a comparison of the newly proposed algorithm and previous algorithms will be evaluated in a table.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Real-Time Implementation Of LPC-10 Codec On TMS320C6713 DSP by Talib Alshammari, Wissam

    Published 2012
    “…The focus on LPC-10 was implemented on the DSP board TMS320C6713 to test the LPC-10 algorithm in realtime. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber by Zuber, Ammar

    Published 2019
    “…This is where the khutbah texts needs to have a certain level of quality and also new knowledge to ensure muslims does not go back home empty-handed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An automatic diacritization algorithm for undiacritized Arabic text by Zayyan, Ayman Ahmad Muhammad

    Published 2017
    “…Moreover, this research is to implement and evaluate the accuracy of the algorithm for dialectal Arabic text. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Autonomous Visual Navigation using Deep Reinforcement Learning: An Overview by Ejaz, M.M., Tang, T.B., Lu, C.-K.

    Published 2019
    “…Finally, we discussed a survey of implemented algorithms of RL in the field of robotics for autonomous visual navigation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Autonomous Visual Navigation using Deep Reinforcement Learning: An Overview by Ejaz, M.M., Tang, T.B., Lu, C.-K.

    Published 2019
    “…Finally, we discussed a survey of implemented algorithms of RL in the field of robotics for autonomous visual navigation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20