Search Results - (( based application tools algorithm ) OR ( some application design algorithm ))*
Search alternatives:
- application design »
- based application »
- application tools »
- some application »
- design algorithm »
- tools algorithm »
-
1
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. This project will use the rapid application development (RAD) methodology since this are the most suitable method for developing the system. …”
Get full text
Get full text
Thesis -
2
-
3
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…The study on related work and comparison of algorithm also has been done in this phase. In Design phase, the use case diagram, whole system flowchart and subsystem flowchart has been constructed to assist the development of this web tool. …”
Get full text
Get full text
Thesis -
4
VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE
Published 2013“…Android is OS system, designed for touch screen mobiles. It creates easy way of writing applications by providing platforms for implementation.…”
Get full text
Get full text
Final Year Project -
5
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
6
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
Development of Lightning Protection System (LPS) Designing Tool
Published 2015Get full text
Get full text
Final Year Project -
9
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
10
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Only the authorized receiver can decrypt the ciphertext with the secret key(s) to obtain the plaintext. Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
-
15
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…To solve the model, an algorithm based on Simulated Annealing (SA) is developed in C/C++ namely SA1. …”
Get full text
Get full text
Thesis -
16
-
17
A Stepper Motor Design Optimization Using
Published 2005“…In order to achieve the optimum design, Genetic Algorithms (GAs) approach has been applied. …”
Get full text
Get full text
Monograph -
18
-
19
-
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
Get full text
Get full text
Get full text
Academic Exercise
