Search Results - (( java implication based algorithm ) OR ( programme a efficient algorithm ))
Search alternatives:
- implication based »
- java implication »
- programme a »
- a efficient »
-
1
Design and implementation of real data fast fourier transform processor on field programmable gates array
Published 2015“…In order to calculate the DFT efficiently, various FFT algorithms and architectures have been presented. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
Agent-based extraction algorithm for computational problem solving
Published 2015“…Therefore, utilizing the agent-based featured agents for this purpose is a benefit with the aim of helping novice programmers to understand the CPS without knowing the programming language. …”
Get full text
Get full text
Thesis -
5
-
6
An FPGA based embedded vision system for real-time motion detection
Published 2015“…The proposed algorithm was implemented on the FPGA with a 25 MHz crystal. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
New algorithms to minimize handoff latency in AMTree protocol
Published 2009“…They show that handoff latency is much lower than that of AMTree handoff algorithm if the mobile source connects to a base station which is subscribed to the multicast group.…”
Get full text
Get full text
Get full text
Article -
8
Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA
Published 2023“…In this study, a new security system design for securing GSM messaging with a lightweight PRINCE algorithm Intellectual Property (IP) Core using Field Programmable Gate Arrays (FPGA) is proposed. …”
Article -
9
Programmable Spatially Variant Single Pixel Imaging Based On Compressive Sensing
Published 2021“…Hence, the essential goal of efficient singlepixel imaging is to maintain a high recovered image quality while reducing the number of measurements and processing time. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…The most efficient design is the pipelined RIPEMD-160 on Arria II GX, which achieves a ratio of 3.5477 Mbps/ALUT, far greater than all other designs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
12
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
A new parameterized architectural design for SENSE reconstruction
Published 2014“…Hardware platforms for specific reconstruction algorithms dramatically increase the power efficiency and decrease the execution time. …”
Get full text
Get full text
Conference or Workshop Item -
15
Parallel computation of maass cusp forms using mathematica
Published 2013“…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
Get full text
Get full text
Thesis -
16
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…A new Q-NAF scalar recoding algorithm is proposed to improve the scalar recoding efficiency criteria. …”
Get full text
Get full text
Thesis -
17
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
Get full text
Get full text
Thesis -
18
Solving fuzzy-facilities layout problem using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
19
Collaborative-based web recommender system for community-driven homestay programmes
Published 2017“…In addition, the CBWR system provides a supportive recommender algorithm which is carried out in a web enabling environment in real time. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Optimal sizing and location of distributed generation for power loss minimization using bee colony algorithm
Published 2023“…MATLAB is used by the assigned ABC algorithm to run the programme. This project performance has been compared with single and multiple DG installation as the system operate without DG installation being a reference point and the project showed the best result. …”
text::Final Year Project
