Search Results - (( system implementation function algorithm ) OR ( data visualisation learning algorithm ))
Search alternatives:
- implementation function »
- visualisation learning »
- system implementation »
- function algorithm »
- data visualisation »
- learning algorithm »
-
1
Visualisation System of COVID-19 Data in Malaysia
Published 2021“…Pandemics are highly unlikely events, therefore, we need a system to understand the statistics about the pandamic. Machine learning algorithms can analyse the data and then we can plan for handling the pandamic. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Visualisation System of COVID-19 Data in Malaysia
Published 2021“…Pandemics are highly unlikely events, therefore, we need a system to understand the statistics about the pandamic. Machine learning algorithms can analyse the data and then we can plan for handling the pandamic. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
The efficacy of personal computer (PC) AI image enhancer software on low and high contrast PA chest radiograph: an experimental study
Published 2026“…Conclusions: The findings highlight the effectiveness of AI software deep learning in visualising anatomical elements in CXR. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Predicting 30-day mortality after an acute coronary syndrome (ACS) using machine learning methods for feature selection, classification and visualization
Published 2021“…Hybrid combinations of feature selection, classification and visualisation using machine learning (ML) methods have the potential for enhanced understanding and 30-day mortality prediction of patients with cardiovascular disease using population-specific data. …”
Get full text
Get full text
Get full text
Article -
8
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
9
IMPLEMENTATION OF NOISE CANCELLATION WITH HARDWARE DESCRIPTION LANGUAGE
Published 2006“…The performance of several adaptive algorithms is compared to determine the desirable algorithm used for adaptive noise cancellation system. …”
Get full text
Get full text
Final Year Project -
10
Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed
Published 2008“…As a new result it is in fact shown that the algorithm iteratively solves a Model Predictive Control related cost function. …”
Get full text
Get full text
Student Project -
11
Implementation of safe experimentation spiral dynamics algorithm for self-tuning of PID controller in elastic joint manipulator
Published 2022“…Such modification is implemented to exploit the ability of spiral function in enhancing both the algorithm's exploration competency and convergence accuracy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article -
13
Festive season balancing groceries optimization / Fairuz Mohamed Razi
Published 2012“…The most important part is during system design and implementation. In this phase, method use in Genetic Algorithm to optimize the system prototype is Rastrigin's function to calculate the fitness of the chromosomes.…”
Get full text
Get full text
Thesis -
14
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…The deployment of network security procedures requires the implementation of cryptographic functions. More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
Get full text
Get full text
Thesis -
15
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
Get full text
Get full text
Get full text
Article -
16
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…However, some trade-offs exist among higher performance, area implementation, and low-power design. Cryptographic algorithms are one of the most important aspects of the hardware implementation of embedded system design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Implementation of Color Filtering on FPGA
Published 2007“…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
Get full text
Get full text
Conference or Workshop Item -
18
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The combination of a DPT with a dynamic 3D S-box strengthens the resistance of the NBA against attacks and increases the randomness of the output.C++ is used in the implementation of both algorithms.The NIST tests are implemented under Linux.…”
Get full text
Get full text
Get full text
Article -
19
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
Published 2004“…Doing arithmetic in finite field is the key part to the implementation of communication and coding system including the newly developed Rijndael the Advanced Encryption Standard (AES). …”
Get full text
Get full text
Thesis -
20
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The research involved three phases, algorithm design, implementation, and evaluation. …”
Get full text
Get full text
Get full text
Thesis
