Search Results - (( code application optimisation algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- application matching »
- code application »
- java application »
-
1
-
2
-
3
-
4
PID controller design for a twin rotor MIMO system using real coded GA optimisation
Published 2009Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
-
6
Development of a scalable video compression algorithm
Published 2012“…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Codebook excited linear predictive coding
Published 2011Get full text
Get full text
Get full text
Book Chapter -
8
Development of CAD/CAM System for Cold Working Closed Die Forging Process
Published 2000“…In the second stage, a finite element analysis and optimisation algorithm was developed to examine the die fatigue life and to optimise the die design. …”
Get full text
Get full text
Thesis -
9
-
10
Artificial immune network model based controller for vibration suppression of flexible structures
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
Get full text
Get full text
Student Project -
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
17
BinDCT Design and Implementation on FPGA with Low Power Architecture
Published 2008“…Its performances in term of Peak Signal-to-Noise (PSNR), compression ratio and coding gain is proved to be best approximation to the DCT algorithm. …”
Get full text
Get full text
Thesis -
18
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
19
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
