Search Results - (( using function path algorithm ) OR ( data integration using algorithm ))

Refine Results
  1. 1

    False path identification algorithm framework for nonseparable controller-data path circuits by Shaheen, Ateeq U. R., Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…Proposed framework uses an integrated functional RTL circuit, called assignment decision diagram (ADD) which target at structural-level. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    False path identification algorithm framework for nonseparable controller-data path circuits by Shaheen, A.-U.-R., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…Proposed framework uses an integrated functional RTL circuit, called assignment decision diagram (ADD) which target at structural-level. …”
    Get full text
    Get full text
    Article
  3. 3

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
    Get full text
    Thesis
  5. 5
  6. 6

    Design and analysis multiple paths trace back and reconstruction module for DNA sequence alignment accelerator using ASIC design flow: article / Nurul Ain Husaini by Husaini, Nurul Ain

    Published 2010
    “…The first objective is to construct the trace back and reconstruction module of the S-W algorithm with the multiple blocks and the functionality for each block. …”
    Get full text
    Get full text
    Article
  7. 7

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…A model-driven approach was used for generating abstract test cases from the feasible paths. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Genetic algorithm for control and optimisation of exothermic batch process by Tan, Min Keng

    Published 2013
    “…As a result, improved multivariable genetic algorithm (IMGA) with adaptable fitness function ability is introduced in this work. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…Extensive computations utilizing MATLAB 2018a on the Intel Core i7/Gen 10 processor and 16 GB of RAM are used to evaluate the algorithm efficacy. According to the blueprint of our heuristic method, the allocation and the optimum number of controllers under an effective decentralized policy could achieve higher efficiency. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Alternative solar-battery charge controller to improve system efficiency by Sabry, Ahmad H., Wan Hasan, Wan Zuha, Ab Kadir, Mohd Zainal Abidin, Mohd Radzi, Mohd Amran, Shafie, Suhaidi

    Published 2015
    “…This paper proposed a high efficiency solar-battery charge controller as an alternative to that controller which is used in most conventional residential solar system , the concept of the proposed controller circuit based on using the off state energy duration of the overcharge current in a separate path, this energy delivers to auxiliary battery or direct load, such as fans, used to cool or ventilate the system components and consequently improving system performance, where the overcharge current refer to that current available stand by when the battery fully charged or reached its maximum charge voltage. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    A collision resistant cryptographic hash function based on cellular automata rules by Jamil, Norziana

    Published 2013
    “…The subject of this thesis is the study of collision resistant hash function. A cryptographic hash function is one of the cryptographic primitives designed to protect the integrity of data such as that in digital signatures and online business transactions. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller by Zaridah, Mat Zain

    Published 2010
    “…This algorithm encode a potential solution to a specific problem on a simple chromosome like data structure and apply recombination operators to this structure to preserve critical information. …”
    Get full text
    Thesis
  16. 16

    A-star (A*) algorithm implementation for robotics path planning navigation by Emirul Ridzwan, Nor Azmi

    Published 2018
    “…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah by Hanafiah, Sukri

    Published 1997
    “…The euler's path it using pseudo input and Heuristic algorithm to find the minimum interlace. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Hybrid path planning for indoor robot with Laplacian Behaviour-based control via four point-explicit group by Azali Saudi, Jumat Sulaiman

    Published 2014
    “…Consequently, the gradient of the potential functions would be used by the searching algorithm to generate path from starting to goal location. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control by Srazhidinov, Radik

    Published 2016
    “…However, this assumption may lead to inaccurate secondary path model. In this work, the modelling of acoustic path using FIR filters is incorporated for both algorithms for Wiener-Hammerstein structure. …”
    Get full text
    Get full text
    Thesis