Search Results - (( using function based algorithm ) OR ( _ coding method algorithm ))

Refine Results
  1. 1

    Analysis of Toothbrush Rig Parameter Estimation Using Different Model Orders in Real Coded Genetic Algorithm (RCGA) by Ainul, H. M. Y., Salleh, S. M., Halib, N., Taib, H., Fathi, M. S.

    Published 2024
    “…Real-coded genetic algorithm (RCGA) as a stochastic global search method was applied for optimization. …”
    Article
  2. 2

    Analysis of toothbrush rig parameter estimation using different model orders in Real-Coded Genetic Algorithm (RCGA) by Ainul, H. M. Y., Salleh, S. M., Halib, N., Taib, H., Fathi, M. S.

    Published 2018
    “…The statistical analysis was used to evaluate the performance of the model based on the objective function which is the Mean Square Error (MSE). …”
    Get full text
    Article
  3. 3

    Genetic algorithm based network coding in wireless ad hoc networks by Tan, Shee Eng

    Published 2013
    “…Genetic algorithm based coding-aware routing (GACAR) is embedded in the wireless ad hoc network with network coding capabilities to search for coding opportunities for unicast sessions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm by Khor, Lay Hoong

    Published 2006
    “…The first stage of this project is the study of Blowfish algorithm and translates the method into VHDL code because VHDL has been commonly used as a design entry language for FPGA in digital design. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Comparative study of secant, Fixed point and Sixth section methods for solving root in nonlinear equation / Nik Syahrul Naim Abdul Rahman by Abdul Rahman, Nik Syahrul Naim

    Published 2017
    “…In this research, these methods are selected because it can be understand and has simple algorithm to use. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results by Fouziah Md Yassin, Ag Asri Ag Ibrahim, Zaturrawiah Ali Omar, Saturi Baco

    Published 2015
    “…The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
    Get full text
    Get full text
    Research Report
  8. 8

    Optimization of coded signals based on wavelet neural network by Ahmed, Mustafa Sami

    Published 2015
    “…We performed evaluation using 13-bit, 35-bit and 69-bit Barker codes as signal codes to WNN. When compared with other existing methods, WNN yields better PSR, low Mean Square Error (MSE), less noise, range resolution ability and Doppler shift performance than the previous and some traditional algorithms like auto correlation function (ACF) algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman by Azman, Alya Kauthar

    Published 2025
    “…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
    Get full text
    Get full text
    Thesis
  10. 10

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Binti Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Proceeding
  11. 11

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Binti Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Proceeding
  12. 12

    Optimal power flow using hybrid firefly and particle swarm optimization algorithm by Khan, Abdullah, Hizam, Hashim, Abdul Wahab, Noor Izzri, Othman, Mohammad Lutfi

    Published 2020
    “…The particular fitness function is chosen as a single objective based on control parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm by Rohani, Fuaad

    Published 2018
    “…Therefore, Jabatan Kemajuan Islam Malaysia (JAKIM) halal premises information is used to represent high data capacity. The thesis proposed a method to place a logo on top of the QR code, embedded with high data capacity, using Genetic Algorithm (GA) search technique to find appropriate size and location so the QR code can be decoded by various QR code decoders. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Crossover and mutation operators of real coded genetic algorithms for global optimization problems by Lim, Siew Mooi

    Published 2016
    “…The rationale behind developing algorithms using real encoding of chromosome representations is the limitations of binary encoding. …”
    Get full text
    Get full text
    Thesis
  16. 16

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Online Programming Judge System (UOJ) by Tran , Quang Trung

    Published 2013
    “…Moreover, the mechanism of test cases generation using PSO algorithm is deeply analyzed. The study would focus on the primary structure of PSO and the proposed fitness function to calculate fitness value for each generated test case. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Genetic algorithm for material cost minimization of external strengthening system with fiber reinforced polymer by Rahman, M.M., Jumaat, Mohd Zamin, Hosen, M.A.

    Published 2012
    “…Genetic algorithm based approach is utilized to solve the optimization task. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
    Get full text
    Get full text
    Student Project