Search Results - (( using function a algorithm ) OR ( basic iteration method algorithm ))

Refine Results
  1. 1

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL by Sharifah Azizah, Wan Alwi

    Published 2022
    “…This security algorithm was examined and put into use in this project using an iterative methodology. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…The LP’s application is need to be further computed with a technique and Simplex algorithm is the one that commonly used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…Basically it is used for message digest. One of the algorithms in hash function is RIPEMD-160. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  4. 4

    Studies on flat CORDIC implementation in field programmable gate arrays (FPGA) / Meera Subramaniam by Meera , Subramaniam

    Published 2004
    “…This work presents a modification to the previous Signed Digit (SD) Generation algorithm and a comparison with the previous method. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Memoryless modified symmetric rank-one method for large-scale unconstrained optimization by Modarres, Farzin, Abu Hassan, Malik, Leong, Wah June

    Published 2009
    “…In this study, we present a scaled memoryless modified Symmetric Rank-One (SR1) algorithm and investigate the numerical performance of the proposed algorithm for solving large-scale unconstrained optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Nomadic people optimizer (NPO) for large-scale optimization problems by Mohamd Salih, Sinan Qahtan

    Published 2019
    “…Good performances were also achieved with the NPO with respect to noise and limited information problems. A Wilcoxon Signed-Rank Test was performed to measure the pair-wise statistical performances of the algorithms and from the results, NPO recorded a better statistical performance compared to the other benchmarking algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Implementation of Symmetric Rank-One Methods for Unconstrained Optimization by Khiyaban, Farzin Modarres

    Published 2010
    “…In this method, the Hessian approximation is updated based on modifed secant equation, which uses both gradient and function value information in order to get a higher-order accuracy in approximating the second curvature of the objec- tive function. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Schelkunoff array synthesis methods using adaptive-iterative algorithm by Abdul Latiff, Nurul Mu'azzah

    Published 2003
    “…Basically, this algorithm is a combination of iterative algorithm with adaptive algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…The basic idea of RKWF based method is to first define a function which measures the outlying distance of observation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Solving Blasius equation using semi analytic iterative method / Nurul Atikah Halmi and Nur Azyyati Ayob by Halmi, Nurul Atikah, Ayob, Nur Azyyati

    Published 2018
    “…Variational iterative method (VIM) and Iteration method existing results was chosen to be compare with SAIM expectation outcomes. …”
    Get full text
    Get full text
    Student Project
  16. 16
  17. 17
  18. 18

    Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches by Mohd Pauzi, Nur Fazlinda

    Published 2015
    “…If iteration available is long, method 3+0+0 is more appropriate, otherwise method 2+1+0 is the best choice. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Interval iterative methods on simultaneous inclusion of polynomial zeros by Mohammad Rusli, Syaida Fadhilah

    Published 2017
    “…The research is based on the existing procedures: the interval symmetric single-step ISS1 and the interval repeated single-step IRSS1. To begin with, the basic concepts of interval computations and some brief introductions on Newton’s method are provided. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhanced convergence of Bat Algorithm based on dimensional and inertia weight factor by Ramli, Mohamad Raziff, Abal Abas, Zuraida, Desa, Mohammad Ishak, Zainal Abidin, Zaheera, Al Azzam, Malik Bader Hasan

    Published 2019
    “…Benchmark test function is then performed for the basic Bat Algorithm and the modified Bat Algorithm (MBA) for comparison. …”
    Get full text
    Get full text
    Get full text
    Article