Search Results - (( using function based algorithm ) OR ( _ coding method algorithm ))
Search alternatives:
- method algorithm »
- using function »
- coding method »
- _ coding »
-
1
Analysis of Toothbrush Rig Parameter Estimation Using Different Model Orders in Real Coded Genetic Algorithm (RCGA)
Published 2024“…Real-coded genetic algorithm (RCGA) as a stochastic global search method was applied for optimization. …”
Article -
2
Analysis of toothbrush rig parameter estimation using different model orders in Real-Coded Genetic Algorithm (RCGA)
Published 2018“…The statistical analysis was used to evaluate the performance of the model based on the objective function which is the Mean Square Error (MSE). …”
Get full text
Article -
3
Genetic algorithm based network coding in wireless ad hoc networks
Published 2013“…Genetic algorithm based coding-aware routing (GACAR) is embedded in the wireless ad hoc network with network coding capabilities to search for coding opportunities for unicast sessions. …”
Get full text
Get full text
Get full text
Thesis -
4
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006“…The first stage of this project is the study of Blowfish algorithm and translates the method into VHDL code because VHDL has been commonly used as a design entry language for FPGA in digital design. …”
Get full text
Get full text
Monograph -
5
Comparative study of secant, Fixed point and Sixth section methods for solving root in nonlinear equation / Nik Syahrul Naim Abdul Rahman
Published 2017“…In this research, these methods are selected because it can be understand and has simple algorithm to use. …”
Get full text
Get full text
Thesis -
6
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…Furthermore, a combination of unfolding and pipelining can also increase the throughput of hash function algorithms.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
Get full text
Get full text
Research Report -
8
Optimization of coded signals based on wavelet neural network
Published 2015“…We performed evaluation using 13-bit, 35-bit and 69-bit Barker codes as signal codes to WNN. When compared with other existing methods, WNN yields better PSR, low Mean Square Error (MSE), less noise, range resolution ability and Doppler shift performance than the previous and some traditional algorithms like auto correlation function (ACF) algorithm.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
Get full text
Get full text
Thesis -
10
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Proceeding -
11
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Proceeding -
12
Optimal power flow using hybrid firefly and particle swarm optimization algorithm
Published 2020“…The particular fitness function is chosen as a single objective based on control parameters. …”
Get full text
Get full text
Get full text
Article -
13
Fractal coding of bio-metric image for face authentication
Published 2021“…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
Get full text
Get full text
Thesis -
14
Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm
Published 2018“…Therefore, Jabatan Kemajuan Islam Malaysia (JAKIM) halal premises information is used to represent high data capacity. The thesis proposed a method to place a logo on top of the QR code, embedded with high data capacity, using Genetic Algorithm (GA) search technique to find appropriate size and location so the QR code can be decoded by various QR code decoders. …”
Get full text
Get full text
Get full text
Thesis -
15
Crossover and mutation operators of real coded genetic algorithms for global optimization problems
Published 2016“…The rationale behind developing algorithms using real encoding of chromosome representations is the limitations of binary encoding. …”
Get full text
Get full text
Thesis -
16
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Get full text
Article -
17
Online Programming Judge System (UOJ)
Published 2013“…Moreover, the mechanism of test cases generation using PSO algorithm is deeply analyzed. The study would focus on the primary structure of PSO and the proposed fitness function to calculate fitness value for each generated test case. …”
Get full text
Get full text
Final Year Project -
18
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Get full text
Article -
19
Genetic algorithm for material cost minimization of external strengthening system with fiber reinforced polymer
Published 2012“…Genetic algorithm based approach is utilized to solve the optimization task. …”
Get full text
Get full text
Conference or Workshop Item -
20
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project
