Search Results - (( system implementation function algorithm ) OR ( square optimization path algorithm ))
Search alternatives:
- implementation function »
- system implementation »
- square optimization »
- function algorithm »
- optimization path »
- path algorithm »
-
1
Development of a State-Space Observer for Active Noise Control Systems
Published 2009“…The secondary path of the ANC system is modeled by using the LMS algorithm to complete the design of the Filtered-X Least Mean Square (FXLMS) controller. …”
Get full text
Get full text
Thesis -
2
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Optimization of substation grounding grid design for horizontal and vertical multilayer and uniform soil condition using Simulated Annealing method
Published 2021“…This paper presents the results of optimization for substation grounding systems using the Simulated Annealing (SA) algorithm in different soil conditions which conforms to the safety requirements of the grounding system. …”
Get full text
Get full text
Article -
4
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
5
IMPLEMENTATION OF NOISE CANCELLATION WITH HARDWARE DESCRIPTION LANGUAGE
Published 2006“…The performance of several adaptive algorithms is compared to determine the desirable algorithm used for adaptive noise cancellation system. …”
Get full text
Get full text
Final Year Project -
6
-
7
A review on path collisions and resources usage in hybrid optical network on chip (HONoC)
Published 2015Get full text
Get full text
Conference or Workshop Item -
8
Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed
Published 2008“…As a new result it is in fact shown that the algorithm iteratively solves a Model Predictive Control related cost function. …”
Get full text
Get full text
Student Project -
9
Implementation of safe experimentation spiral dynamics algorithm for self-tuning of PID controller in elastic joint manipulator
Published 2022“…Such modification is implemented to exploit the ability of spiral function in enhancing both the algorithm's exploration competency and convergence accuracy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article -
11
Festive season balancing groceries optimization / Fairuz Mohamed Razi
Published 2012“…The most important part is during system design and implementation. In this phase, method use in Genetic Algorithm to optimize the system prototype is Rastrigin's function to calculate the fitness of the chromosomes.…”
Get full text
Get full text
Thesis -
12
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…The deployment of network security procedures requires the implementation of cryptographic functions. More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
Get full text
Get full text
Thesis -
13
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
Get full text
Get full text
Get full text
Article -
14
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…However, some trade-offs exist among higher performance, area implementation, and low-power design. Cryptographic algorithms are one of the most important aspects of the hardware implementation of embedded system design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
Collision avoidance mechanisms using artificial potential field for UAVs
Published 2025“…The developed simulation framework serves as a reproducible platform for benchmarking and future algorithmic extensions. This research demonstrates the APF algorithm’s robustness and practical applicability while identifying limitations related to environmental adaptability and the need for parameter optimization in more complex flight conditions.…”
Get full text
Get full text
Get full text
Article -
17
Implementation of Color Filtering on FPGA
Published 2007“…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
Get full text
Get full text
Conference or Workshop Item -
18
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The combination of a DPT with a dynamic 3D S-box strengthens the resistance of the NBA against attacks and increases the randomness of the output.C++ is used in the implementation of both algorithms.The NIST tests are implemented under Linux.…”
Get full text
Get full text
Get full text
Article -
19
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
Published 2004“…Doing arithmetic in finite field is the key part to the implementation of communication and coding system including the newly developed Rijndael the Advanced Encryption Standard (AES). …”
Get full text
Get full text
Thesis -
20
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The research involved three phases, algorithm design, implementation, and evaluation. …”
Get full text
Get full text
Get full text
Thesis
