Search Results - (( java integration a algorithm ) OR ( system implementation function algorithm ))
Search alternatives:
- implementation function »
- system implementation »
- function algorithm »
- java integration »
- integration a »
- a algorithm »
-
1
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…The application was programmed by JAVA FX. The system was developed stage by stage as it is consist of many small components to form a large system. …”
Get full text
Get full text
Thesis -
2
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Efficiency and scalability on mining complete set of patterns is the challenge of sequential pattern mining. A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Thesis -
5
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
7
IMPLEMENTATION OF NOISE CANCELLATION WITH HARDWARE DESCRIPTION LANGUAGE
Published 2006“…The performance of several adaptive algorithms is compared to determine the desirable algorithm used for adaptive noise cancellation system. …”
Get full text
Get full text
Final Year Project -
8
Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed
Published 2008“…As a new result it is in fact shown that the algorithm iteratively solves a Model Predictive Control related cost function. …”
Get full text
Get full text
Student Project -
9
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Efficiency and scalability on mining complete set of patterns is the challenge of sequential pattern mining. A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Get full text
Thesis -
10
Implementation of safe experimentation spiral dynamics algorithm for self-tuning of PID controller in elastic joint manipulator
Published 2022“…Such modification is implemented to exploit the ability of spiral function in enhancing both the algorithm's exploration competency and convergence accuracy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article -
12
Festive season balancing groceries optimization / Fairuz Mohamed Razi
Published 2012“…The most important part is during system design and implementation. In this phase, method use in Genetic Algorithm to optimize the system prototype is Rastrigin's function to calculate the fitness of the chromosomes.…”
Get full text
Get full text
Thesis -
13
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…The deployment of network security procedures requires the implementation of cryptographic functions. More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
Get full text
Get full text
Thesis -
14
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
Get full text
Get full text
Get full text
Article -
15
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…However, some trade-offs exist among higher performance, area implementation, and low-power design. Cryptographic algorithms are one of the most important aspects of the hardware implementation of embedded system design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
17
Implementation of Color Filtering on FPGA
Published 2007“…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
Get full text
Get full text
Conference or Workshop Item -
18
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The combination of a DPT with a dynamic 3D S-box strengthens the resistance of the NBA against attacks and increases the randomness of the output.C++ is used in the implementation of both algorithms.The NIST tests are implemented under Linux.…”
Get full text
Get full text
Get full text
Article -
19
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
Published 2004“…Doing arithmetic in finite field is the key part to the implementation of communication and coding system including the newly developed Rijndael the Advanced Encryption Standard (AES). …”
Get full text
Get full text
Thesis -
20
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The research involved three phases, algorithm design, implementation, and evaluation. …”
Get full text
Get full text
Get full text
Thesis
