Search Results - (( java implication based algorithm ) OR ( level implementation during algorithm ))*
Search alternatives:
- implementation during »
- level implementation »
- implication based »
- java implication »
- during algorithm »
-
1
-
2
-
3
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…Moreover, algorithm visualization systems are also useful tools in algorithm engineering, particularly at several stages during the design, implementation, analysis, tuning, experimental evaluation, and presentation of the algorithms process. …”
Get full text
Get full text
Get full text
Article -
4
A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization
Published 2019“…However, the high-level granularity access control caused high complexity and increased the number of rules that must be checked during the authorization process, which degrade the overall authorization performance. …”
Get full text
Get full text
Thesis -
5
Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors
Published 2020“…The results show that the SV-SIP implementation can increase efficiency of side view task as compared to gaze-directed WIP implementation, and the fatigue level of SV-SIP is lower than the gaze-directed WIP implementation. …”
Get full text
Get full text
Thesis -
6
An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique
Published 2006“…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
Get full text
Get full text
Thesis -
7
Boundary control of a dual-output boost converter with multilevel inverter topology / Messikh Tarek
Published 2017“…Steady state characteristics and large signal stability analysis are carried out for the DOBC, the sensorless control algorithm is implemented in TMS320F2812. A three-level algorithm of SVPWM is implemented in Altera DE2 board to control the three-level inverter which ensures lower hardware resource usage and satisfy the switching time criteria. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
DC-link capacitor voltage regulation for three-phase three-level inverter-based shunt active power filter with inverted error deviation control
Published 2016“…To validate effectiveness and feasibility of the proposed algorithm, simulation work in MATLAB-Simulink and experimental implementation utilizing a TMS320F28335 Digital Signal Processor (DSP) are performed. …”
Get full text
Get full text
Get full text
Article -
10
Design and Implementation of Advanced Encryption Standard Using Verilog HDL
Published 2020“…One of the main concerns involving software implementation of encryption algorithm is the possibility of slower processing when transmitting and receiving data which consequently will encounter low security level during process of encryption for real-time application. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Real-Time Implementation Of LPC-10 Codec On TMS320C6713 DSP
Published 2012“…During last two decades various speech coding algorithms have been developed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
A novel Master–Slave optimization algorithm for generating an optimal release policy in case of reservoir operation
Published 2019“…In addition, two different optimization algorithms, namely crow search algorithm and master–slave algorithm, have been introduced to generate an optimal rule for water release policy. …”
Get full text
Get full text
Article -
13
Establishment of perez du-mortier calibration algorithm as a sunphotometers calibration protocol at a altitude above sea level
Published 2017“…Recently, near sea level Langley calibration method for ground based measurement was developed by combining Perez Du- Mortier (PDM) algorithm with statistical filter. …”
Get full text
Get full text
Get full text
Thesis -
14
Design and implementation of advanced encryption standard using verilog HDL
Published 2022“…One of the main concerns involving software implementation of encryption algorithm is the possibility of slower processing when transmitting and receiving data which consequently will encounter low security level during process of encryption for real-time application. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Diagnosis of acne vulgaris on face using fuzzy expert system / Nur Sabrina Anuar
Published 2017“…Thus, it can save time and cost to diagnose acne. The FES algorithm will process five input fields such as cysts, nodules, papules, pustules and comedones, and then produced one output fields which is the level of severity of acne. …”
Get full text
Get full text
Thesis -
18
AN INVESTIGATION OF INDOOR LOCALIZATION BASED ON WI-FI FOR MOBILE USER
Published 2019“…All the indoor positioning methods are studied and analyzed according to their implementation and level of accuracy. After the observation is done, the fingerprinting method is selected to be implemented in this project with the measurement of received signal strength (RSS) of all available access points. …”
Get full text
Get full text
Final Year Project -
19
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
20
The effects of compiler optimizations in face recognition system
Published 2009Get full text
Article
