Search Results - (( using application design algorithm ) OR ( java implication tree algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Design and analysis of construction and recombination module using Idury Waterman Algorithm for fragment assembly application / Hafifi Mohd Rafi by Mohd Rafi, Hafifi

    Published 2012
    “…There is several algorithms use in sequencing of DNA fragment. This paper presents a study on design and analysis of construction and recombination module using IduryWaterman algorithm and fragment assembly application using Verilog. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Effectiveness of nature-inspired algorithms using ANFIS for blade design optimization and wind turbine efficiency by Sarkar, Md. Rasel, Julai, Sabariah, Chong, Wen Tong, Toha @ Tohara, Siti Fauziah

    Published 2019
    “…It was found that the optimized blade design parameters were obtained using an ABC algorithm with the maximum value power coefficient higher than ACO and PSO. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Schelkunoff array synthesis methods using adaptive-iterative algorithm by Abdul Latiff, Nurul Mu'azzah

    Published 2003
    “…For that reason, it is the purpose of this thesis to outline the implementation and use of adaptive-iterative algorithm in designing antenna array. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    OPTIMAL DESIGN OF A BLDC MOTOR BY GENETIC ALGORITHM by OTHMAN, AZRUL HISHAM

    Published 2007
    “…The project report describes an optimal design of Brushless DC (BLDC) motor using Genetic Algorithm (GA) and Simulated Annealing (SA). …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10

    Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL by Shamsiah, Suhaili, Cleopatra Chundang, Niam, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2020
    “…Hash functions are one of the cryptographies that can be used in both security design applications and protocol suites. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Design and implementation of MD5 hash function algorithm using verilog HDL by Shamsiah, Suhaili, Niam, Cleopatra Chundang, Zainah, Md Zain, Norhuzaimin, Julai

    Published 2022
    “…Hash functions are one of the cryptographies that can be used in both security design applications and protocol suites. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Effectiveness of Nature-Inspired Algorithms using ANFIS for Blade Design Optimization and Wind Turbine Efficiency by Sarkar, Md Rasel, Julai, Sabariah, Chong, Wen Tong, Toha, Siti Fauziah

    Published 2019
    “…It was found that the optimized blade design parameters were obtained using an ABC algorithm with the maximum value power coefficient higher than ACO and PSO. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Design of low order quantitative feedback theory and H-infinity-based controllers using particle swarm optimisation for a pneumatic actuator system by Ali, Hazem I.

    Published 2010
    “…A method for robust controllers design using restricted structure controllers such as PID, Lag-Lead and deadbeat control algorithms is presented. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Design of a flexible digital baseband signal processing algorithm by Mohamad, Rosalina, Harun, Harlisya, Nuzli, Mohamad Anas, Dimyati, Kaharudin

    Published 2006
    “…The work presented in this paper is aimed at designing a flexible digital baseband signal processing algorithm (DBSP) for satellite applications. …”
    Get full text
    Get full text
    Conference or Workshop Item