Search Results - (( 5s implementation using algorithm ) OR ( using code using algorithm ))
Search alternatives:
- implementation using »
- 5s implementation »
- using algorithm »
- using code »
- code using »
-
1
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
2
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…The purpose of this project is to implement FPGA Base Encryption Chip using DES algorithm. …”
Get full text
Get full text
Monograph -
3
Implementation of perez-dumortier calibration algorithm
Published 2014“…The governing theory of the algorithm was discussed in the previous chapter. This chapter presents information on how to implement the Perez-Dumotier calibration algorithm using actual field measurement. …”
Get full text
Get full text
Get full text
Chapter In Book -
4
A low complexity multi-layered space frequency coding detection algorithm for MIMO-OFDM
Published 2012“…Hence, the proposed detection algorithms can be used to maintain guaranteed quality of service (QoS) in MIMO-OFDM system.…”
Get full text
Get full text
Conference or Workshop Item -
5
Speech coding for Bluetooth with CVSD algorithm
Published 2004“…Speech coding is performed using numerous steps or operations specified as an algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
Get full text
Get full text
Research Report -
10
Reusability techniques in load-flow analysis computer program
Published 2004“…These methodologies made the developed load-flow analysis software flexible for future enhancement. Adding and changing codes and algorithm of the software can be done without affecting much the existing codes and algorithms. …”
Get full text
Get full text
Article -
11
Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom
Published 2015“…The codes of the scripting language are shown to easily use, concisely describe the algorithm in a directly publishable form and flexible for new problem creations. …”
Get full text
Get full text
Thesis -
12
-
13
VLSI implementation of huffman design using FPGA with a comprehensive analysis of power restrictions
Published 2015“…The simulations are carried out by using Modelsim tool. The architecture of compression and decompression algorithm design has been created using Verilog HDL language. …”
Get full text
Get full text
Get full text
Article -
14
Effective and efficient attendance tracking system using secret code
Published 2023Conference Paper -
15
-
16
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
Published 2004“…The principle benefit of using this new approach over the transform from Rijndael block cipher is speed. …”
Get full text
Get full text
Thesis -
17
Recent advances of whale optimization algorithm, its versions and applications
Published 2024“…The successful applications of WOA are summarized. The open-source codes of the WOA code are given to build a wealthy WOA review. …”
Book chapter -
18
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…All these design methodologies aim to confirm the effect of HDL coding style on the performance of hardware algorithms implemented on FPGA. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi
Published 2012“…For the hardware architecture design, we choose bit-serial structure for implementing our algorithm to benefit from its advantages. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Job recruiting system using sorting Algorithm / Adi Asyraf Ayob
Published 2020“…The requirements of the system was first identified by interview session with an IT company before proceeding to system design and development which involve process of designing prototype and scripting the system coding. The functionality of the prototype was tested using Test Script while the usability testing was performed by collecting response from the system users about the usefulness, ease of use, and satisfaction. …”
Get full text
Get full text
Thesis
