Search Results - (( some application tools algorithm ) OR ( its application using algorithms ))*
Search alternatives:
- application tools »
- some application »
- using algorithms »
- tools algorithm »
- its application »
-
1
University class timetable tool
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
ANALYSIS AND INTERPRETATION OF PRESSURE TRANSIENT TEST DATA BY RECENT ROBUST DECONVOLUTION METHODS
Published 2013Get full text
Get full text
Final Year Project -
4
Modeling And Control Of V-Groove Rotary Impact Driver
Published 2020“…Rotary-impact screw driver which is categorized as hand-held cordless power tool raised the opportunities of use in many applications. …”
Get full text
Get full text
Thesis -
5
Advances of metaheuristic algorithms in training neural networks for industrial applications
Published 2023Article -
6
Detection and Recognition of Broken Character in Car Plate Image
Published 2020“…Therefore, this study is concerned to develop a tool with recognition algorithm that able to detect the broken character on car plate by using Template Matching. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Real-time tracking using edge and color feature
Published 2014Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
-
9
Automatic generic process migration system in linux
Published 2012“…They generally depend on specific features in kernel or target some well behaved applications. These packages are specifically tailored for specific goals, result in predefined operation which contradicts with the concept of generic tools. …”
Get full text
Get full text
Thesis -
10
-
11
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Seismic attribute feasibility study for fault and fracture analysis and integration with spectral decomposition: Application in Sarawak basin
Published 2019Get full text
Get full text
Conference or Workshop Item -
14
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…In a volatile manufacturing system, implementation of a CMS might not be applicable. In such a situation, the use of a Hybrid Cellular Manufacturing (HCM) seems to be more reasonable. …”
Get full text
Get full text
Thesis -
15
-
16
Machine condition monitoring and fault diagnosis using spectral analysis techniques
Published 2001“…Both normal and fault signals are analyzed using the singular value decomposition (SVD) algorithm so as to compute the parameters of the auto regressive moving average (ARMA) models. …”
Get full text
Get full text
Proceeding Paper -
17
-
18
-
19
A Conceptual Modeling Of Optical Properties Of Ruby Stone Using Charge-Coupled Device (CCD) Tomography Approach
Published 2024thesis::master thesis -
20
Towards a unified image quality assessment technique for cross-content image processing applications
Published 2024“…It can reconstruct images with five distortion types, outperforming SOTA AS algorithms, even under high distortion. The first stage uses an application-specific reconstruction algorithm, while the second stage employs an IQA-based model called the observation-based bilateral filter (OBF) with non-linear weights calculated using a Haar-PSI-based maximum a posteriori (MAP) estimator. …”
Get full text
Thesis
