Search Results - (( java implication based algorithm ) OR ( software (programmer OR programmes) system algorithm ))
Search alternatives:
- implication based »
- java implication »
- system algorithm »
-
1
-
2
Booth’s Algorithm Design Using Field Programmable Gate Array
Published 2014Get full text
Get full text
Get full text
Article -
3
Design and development of a programmable painting robot for houses and buildings
“…In Hardware Part, Mechanical Design, Fabrication, Electrical And Electronics System Are Described And In Software Part, Control Algorithm Is Explained. …”
Get full text
Get full text
Article -
4
Design and development of a programmable painting robot for houses and buildings
Published 2005“…In hardware part, mechanical design, fabrication, electrical and electronics system are described and in software part, control algorithm is explained. …”
Get full text
Get full text
Article -
5
FPGA Implementation of Emergency Door Car Entry System
Published 2008“…Emergency door car entry system can be implemented using Field Programmable Gate Array (FPGA) board. …”
Get full text
Learning Object -
6
-
7
Design of a reconfigurable computing platform
Published 2023“…The RCP utilizes Impulse CoDeveloper which is an electronic system level (ESL) design tool that compiles sequential applications/algorithms in C to synthesizable HDL. …”
Conference paper -
8
-
9
Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm
Published 2009“…This method also enables us to design the controller to work as PDFLC, PIFLC or PIDFLC depending on two (one-bit) external signals with programmable fuzzy sets and programmable rule table using VHDL language for implementation on FPGA device, and to employ the new technique of fuzzy algorithm in order to serve a wide range of the physical systems which require a real-time operation. …”
Get full text
Get full text
Get full text
Article -
10
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…Traditional Encryption Algorithms are implemented in software base because of the complexities involved in the operations. …”
Get full text
Get full text
Monograph -
11
Implementation of PID controller on revolute control of universal strech and bending machine (USBM) simplified model
Published 2008“…After that the controller and DC motor are interfaced using Programmable Logic Controller, PLC. Using PLC, the controller is algorithm is implemented by using ladder diagram in CX-programmer software …”
Get full text
Get full text
Undergraduates Project Papers -
12
-
13
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009“…The target was to develop models which mimic the actual cutting process using the Finite Element Method (FEM) and to validate the developed tool path strategy algorithm with the actual machining process and to programmer the developed algorithm into software. …”
Get full text
Get full text
Conference or Workshop Item -
14
Hardware And Software Partitioning Using Genetic Algorithm In Image Processing Application
Published 2018“…In this project, HW-SW Partitioning is used as a process to map each task of image processing application to be executed either in software (Hard Processor System, HPS) or hardware (Field Programmable Gate Array, FPGA). …”
Get full text
Get full text
Monograph -
15
An experimental validation and optimisation tool path strategy for thin walled structure
Published 2011“…The target was to develop models which mimic the actual cutting process using the finite element method (FEM), to validate the developed tool path strategy algorithm with the actual machining process and to programme the developed algorithm into the software. …”
Get full text
Get full text
Get full text
Article -
16
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
17
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
Published 2000“…This paper presents a pipeline implementation of the Secure Hash Algorithm, SUA-I. This design is targeted for the Altera FlexlOKE50 Field Programmable Gate Array (FPGA) on a PCI card. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
-
20
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…With those improvements in accuracy and the speed, the proposed algorithm contributes to the advancement of finger vein biometric system.…”
Get full text
Get full text
Thesis
