Search Results - (( _ application design algorithm ) OR ( based application during algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan by Wan Chik, Wan Adnan

    Published 2006
    “…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…Moreover, other than the memory-based feature, SED algorithm has fewer design parameters to be addressed and the independence of the gain sequence in the tuning process. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…Moreover, other than the memory-based feature, SED algorithm has fewer design parameters to be addressed and the independence of the gain sequence in the tuning process. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Integrated optimal control and parameter estimation algorithms for discrete-time nonlinear stochastic dynamical systems by Kek, Sie Long

    Published 2011
    “…Instead of solving the original optimal control problem, the model-based optimal control problem is solved. The algorithm developed in this thesis contains three sub-algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique by Zamri, Muhamad Najib

    Published 2006
    “…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179) by Ahmad, Nazihah, Ibrahim, Haslinda

    Published 2021
    “…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
    Get full text
    Get full text
    Monograph
  15. 15
  16. 16
  17. 17

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
    Get full text
    Get full text
    Thesis
  20. 20