Search Results - (( java implication based algorithm ) OR ( level implementation some algorithm ))*
Search alternatives:
- level implementation »
- implementation some »
- implication based »
- java implication »
- some algorithm »
-
1
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…At the algorithmic level, several approaches for solving the pose estimation problem are compared in terms of their neural implementability. …”
Get full text
Get full text
Thesis -
2
-
3
ANALYSIS AND INTERPRETATION OF PRESSURE TRANSIENT TEST DATA BY RECENT ROBUST DECONVOLUTION METHODS
Published 2013“…Recently, the robust deconvolution algorithms that tolerate high levels of errors in pressure and rate than the previous deconvolution algorithms have been introduced in the literature. …”
Get full text
Get full text
Final Year Project -
4
-
5
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
6
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
7
Development of heuristic task scheduling algorithm in cloud computing
Published 2016“…The proposed algorithm is followed by a discussion in order to make smoother the implementation. …”
Get full text
Get full text
Proceeding Paper -
8
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…Per Hob Behavoiurs (PHBs) are implemented at DiffServ networks nodes using some scheduling and queuing mechanisms that are predecessor by markers and shaper. …”
Get full text
Get full text
Thesis -
9
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Finally, a comparison of the newly proposed algorithm and previous algorithms will be evaluated in a table.…”
Get full text
Get full text
Get full text
Article -
10
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Real-Time Implementation Of LPC-10 Codec On TMS320C6713 DSP
Published 2012“…The focus on LPC-10 was implemented on the DSP board TMS320C6713 to test the LPC-10 algorithm in realtime. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…This is where the khutbah texts needs to have a certain level of quality and also new knowledge to ensure muslims does not go back home empty-handed. …”
Get full text
Get full text
Thesis -
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
An automatic diacritization algorithm for undiacritized Arabic text
Published 2017“…Moreover, this research is to implement and evaluate the accuracy of the algorithm for dialectal Arabic text. …”
Get full text
Get full text
Get full text
Thesis -
16
Autonomous Visual Navigation using Deep Reinforcement Learning: An Overview
Published 2019“…Finally, we discussed a survey of implemented algorithms of RL in the field of robotics for autonomous visual navigation. …”
Get full text
Get full text
Conference or Workshop Item -
17
Autonomous Visual Navigation using Deep Reinforcement Learning: An Overview
Published 2019“…Finally, we discussed a survey of implemented algorithms of RL in the field of robotics for autonomous visual navigation. …”
Get full text
Get full text
Conference or Workshop Item -
18
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
Get full text
Get full text
Get full text
Thesis -
19
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
20
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
