Search Results - (( java application reoptimize algorithm ) OR ( basic complete based algorithm ))
Search alternatives:
- application reoptimize »
- java application »
- basic complete »
- complete based »
-
1
Butterfly Triple System Algorithm Based on Graph Theory
Published 2022Get full text
Get full text
Get full text
Article -
2
Fast clock tree generation using exact zero skew clock routing algorithm
Published 2009“…The routing algorithm used in this tool is based on the Exact Zero Skew Routing Algorithm. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Genetic algorithm for the design improvement of Turbocharger
Published 2010Get full text
Working Paper -
5
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
6
A fuzzy case-based reasoning model for software requirements specifications quality assessment
Published 2023“…Additionally, for efficient cases retrieval in the CBR, relevant cases selection and nearest cases selection heuristic search algorithms are used in the system. Basically, the input to the relevant cases algorithm is the available cases in the system case base and the output is the relevant cases. …”
Article -
7
Zero skew clock routing for fast clock tree generation
Published 2008“…The routing algorithm used in this tool is based on the Exact Zero Skew Routing Algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Crypto Embedded System for Electronic Document
Published 2006“…The 32-bit soft cores of AlteraÂ’s Nios RISC processor is used as the basic building blocks of the proposed complete embedded solutions. …”
Get full text
Get full text
Article -
9
Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches
Published 2015“…At high iterations of 204 and above, method 3+0+0 dominates the best performance. Based on this finding, the selection of the best method can be decided based on the iteration time available. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Noise Cancellation method in assistive listening system
Published 2020“…Those algorithms were Least Means Square, Normalize-Least Means Square, Recursive Least Square, Simple SetMembership Algorithm and Dynamic Set-Membership Affine Projection Algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
11
-
12
SOLID-STATE MP3 PLAYER
Published 2005“…A simple block diagram of a complete player basically consists of • A solid-state memory to store data…”
Get full text
Get full text
Final Year Project -
13
Image Based Oil Palm Tree Crowns Detection
Published 2020“…Image Based Oil Palm Tree Crowns Detection system is a basic system that enables the detection of oil palm tree crowns from red, green and blue (RGB) aerial images. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
14
-
15
Review of wire-mesh tomography in different experiments
Published 2021“…The image reconstruction algorithms, including the traditional wire-mesh direct image reconstruction algorithm, the linear back projection, the projected Land weber iteration, and the total variation based iteration, are conducted and the results are compared each other…”
Get full text
Get full text
Get full text
Article -
16
Mobile robot positioning system
Published 2008“…This component is build with complete circuit interface to a Parallax Basic Stamp (BS2) microcontroller module. …”
Get full text
Learning Object -
17
An enhanced minimum variance distortionless response beamformer techniques to reduce interference in array antenna system
Published 2017“…The obtained results confirm the complete agreement between MVDR technique and hybrid intelligent swarm PSOGSA algorithm. …”
Get full text
Get full text
Thesis -
18
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
20
Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques
Published 2021“…Finally, the Buildings Footprint developed based on the algorithm was compared with the Buildings Footprint developed manually to assess the accuracy of the results. …”
Get full text
Get full text
Get full text
Thesis
