Search Results - (( java implication based algorithm ) OR ( software programmes new algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…This would greatly shorten the instructions used by the algorithms and improved the execution time of the programmes. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm by Obaid, Zeyad Assi, Sulaiman, Nasri, Hamidon, Mohd Nizar

    Published 2009
    “…This method also enables us to design the controller to work as PDFLC, PIFLC or PIDFLC depending on two (one-bit) external signals with programmable fuzzy sets and programmable rule table using VHDL language for implementation on FPGA device, and to employ the new technique of fuzzy algorithm in order to serve a wide range of the physical systems which require a real-time operation. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Hardware implementation of RC4A stream cipher by Al Noman, Abdullah, Mohd Sidek, Roslina, Ramli, Abdul Rahman

    Published 2009
    “…Implementation of cryptographic algorithms on hardware runs faster than on software and at the same time offering more intrinsic security. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Development of oil palm fresh fruit bunch maturity assessment software for personal digital assistant by Kavandi, Nader

    Published 2011
    “…The software allows the user to take a picture from the FFBs using the built-in camera of the PDA and analyze it inside the PDA using a wisely implemented Hue based image processing algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing understanding of programming concepts through physical games by Raja Yusof, Raja Jamilah, Habib, Ahsan

    Published 2017
    “…There are many approaches in teaching programming such as through application software on line and offline, through software application games) and physical activities such as board games, dancing and computational thinking activities. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Design and development of high performance swa cell design for local DNA sequence alignment by Syed Abdul Rahman, Syed Abdul Mutalib Al Junid

    Published 2017
    “…This study proposed three new DNA sequence alignment accelerator system cell design and architecture based on the Smith-Waterman Algorithm (SWA) named as the new Optimized SWA Linear Gap Penalty (OSL), Optimized SWA Affine Gap Penalty (OSA), and Optimized Recursive Variable Expansion SWA Linear Gap Penalty (ORSL). …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection by Sevamalai, Venantius Kumar

    Published 1998
    “…Therefore a study was conducted to introduce a new algorithm to inspect integrated circuit package markings. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. Hence, there is a need for development of techniques and schemes to obfuscate sensitive parts of software to protect it from reverse engineering attacks. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Smart final year project archive system using laravel framework with email notification (SFYPAS) / Abidah Mat Taib by Mat Taib, Abidah, Mohd Shukri, Noor Atirah, Ahmad Zukri, Nurul Hidayah, Ghazali, Norlizawati

    Published 2020
    “…For future work, the system can be improved by adding a search engine that implements any searching algorithm to yield better results.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…It statically detects when the data comes from tainted sources, when they are stored in the back-end database, and when they are retrieved later in another point to build a new SQL statement without proper sanitisation. This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
    Get full text
    Get full text
    Thesis