Search Results - (( its application designing algorithm ) OR ( _ application using (algorithmic OR algorithms) ))

Refine Results
  1. 1

    Schelkunoff array synthesis methods using adaptive-iterative algorithm by Abdul Latiff, Nurul Mu'azzah

    Published 2003
    “…By the co-emergence of these algorithms, a better performance and wider application are hoped to be achieved since each of these algorithms has its own advantages respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Fast decryption method for a Rabin primitive-based cryptosystem by Asbullah, Muhammad Asyraf, Kamel Ariffin, Muhammad Rezal

    Published 2014
    “…The Chinese Remainder Theorem (CRT) is an algorithm for solving linear congruence system into a unique representation and has been a useful tool in applications of cryptography. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    A multi-objective Spiral Dynamic algorithm and its application for PD design by Ahmad Nor Kasruddin, Nasir, Mohd Ashraf, Ahmad, A. R.A., Azwan, Mohd Falfazli, Mat Jusof

    Published 2017
    “…On the other hand, NS is a fast strategy to develop good Pareto Front (PF) characteristics for MO type algorithm. The proposed algorithm is tested with various benchmark functions used to test a newly developed MO algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy by Madzzaini, Nur Sofea Eleena

    Published 2017
    “…Usually, one sinusoidal wave is used for one inverter. In this design, SPWM is used for multilevel inverter application in photovoltaic (PV) system. …”
    Get full text
    Get full text
    Student Project
  7. 7

    A MODIFIED PARTICLE SWARM OPTIMIZATION ALGORITHM FOR WELLBORE TRAJECTORY DESIGN by BISWAS, KALLOL

    Published 2021
    “…The improvements of the original PSO algorithm are proposed by updating its exploitation phase by incorporating the GWO algorithm because of its strong exploitation capability and the exploration phase using a cellular automaton due to its ability to explore more area by constructing new neighbours. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm by ,, Dwi Pebrianti, Ann Ayop azmi, Nurnajmi Qasrina, Bayuaji, Luhur, Suarin, Nur Aisyah Syafinaz, ,, Muhammad Syafrullah

    Published 2022
    “…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
    Get full text
    Get full text
    Book Chapter
  12. 12

    OPTIMAL DESIGN OF A BLDC MOTOR BY GENETIC ALGORITHM by OTHMAN, AZRUL HISHAM

    Published 2007
    “…Brushless DC (BLDC) motors are widely used in many applications in the industry and as such, the design of the motor and its control circuits are very important. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14

    Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL by Shamsiah, Suhaili, Cleopatra Chundang, Niam, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2020
    “…Hash functions are one of the cryptographies that can be used in both security design applications and protocol suites. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    DC motor control using LQR algorithm by Adezeno, Sagoli Olid

    Published 2008
    “…An application in Matlab called Simulink is used as tools for algorithm implementation. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17
  18. 18
  19. 19

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Design and implementation of MD5 hash function algorithm using verilog HDL by Shamsiah, Suhaili, Niam, Cleopatra Chundang, Zainah, Md Zain, Norhuzaimin, Julai

    Published 2022
    “…Hash functions are one of the cryptographies that can be used in both security design applications and protocol suites. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item