Search Results - (( code application during algorithm ) OR ( its applications using algorithm ))*
Search alternatives:
- application during »
- applications using »
- code application »
- during algorithm »
- its applications »
- using algorithm »
-
1
-
2
Enhanced algorithms for three-dimensional object interpreter
Published 2004Get full text
Get full text
Get full text
Thesis -
3
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
Get full text
Get full text
Get full text
Thesis -
4
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
-
6
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC
Published 2011“…The recently developed Distributed Video Coding (DVC) is typically suitable for the applications where the conventional video coding is not feasible because of its inherent high-complexity encoding. …”
Get full text
Get full text
Thesis -
9
Pixel Intensity-Based Contrast Algorithm (PICA) for Image Edges Extraction (IEE)
Published 2023Article -
10
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi
Published 2025“…This could include for instance a systematic literature review on theories available to understand the current problem and its possible solution, analysis of the users need gathered from interviews, and of course the application development using Flutter within Visual Studio Code. …”
Get full text
Get full text
Thesis -
14
-
15
A study on channel coding for 5G / Xu Wei
Published 2019Get full text
Get full text
Get full text
Thesis -
16
-
17
-
18
-
19
-
20
An e-voting application using cryptography technology
Published 2020“…HTTPS communication protocol is encrypted using Transport Layer Security (TLS) or its predecessor, Secure Sockets Layer (SSL). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
