Search Results - (( java implication based algorithm ) OR ( software programme system algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…Traditional Encryption Algorithms are implemented in software base because of the complexities involved in the operations. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Design and development of a programmable painting robot for houses and buildings by Aris, I., Parvez Iqbal, A. K. M., Ramli, A. R., Shamsuddin, S.

    “…In Hardware Part, Mechanical Design, Fabrication, Electrical And Electronics System Are Described And In Software Part, Control Algorithm Is Explained. …”
    Get full text
    Get full text
    Article
  6. 6

    Design and development of a programmable painting robot for houses and buildings by Aris, A. K. M., Iqbal, Parvez, Ramli, A. R., Shamsuddin, S

    Published 2005
    “…In hardware part, mechanical design, fabrication, electrical and electronics system are described and in software part, control algorithm is explained. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Hardware And Software Partitioning Using Genetic Algorithm In Image Processing Application by Loo, Fang Hean

    Published 2018
    “…In this project, HW-SW Partitioning is used as a process to map each task of image processing application to be executed either in software (Hard Processor System, HPS) or hardware (Field Programmable Gate Array, FPGA). …”
    Get full text
    Get full text
    Monograph
  10. 10

    FPGA Implementation of Emergency Door Car Entry System by Zaini Sulaiman

    Published 2008
    “…Emergency door car entry system can be implemented using Field Programmable Gate Array (FPGA) board. …”
    Get full text
    Learning Object
  11. 11

    Design of a reconfigurable computing platform by Papu J.J., See O.H.

    Published 2023
    “…The RCP utilizes Impulse CoDeveloper which is an electronic system level (ESL) design tool that compiles sequential applications/algorithms in C to synthesizable HDL. …”
    Conference paper
  12. 12

    Develpoment of combinatorial optimisation for cutting tool path strategy by Alsultaney, Hazem K., Mohd Ariffin, Mohd Khairol Anuar, Baharudin, B. T. Hang Tuah, Ali, Aidy, Mustapha, Faizal

    Published 2009
    “…The target was to develop models which mimic the actual cutting process using the Finite Element Method (FEM) and to validate the developed tool path strategy algorithm with the actual machining process and to programmer the developed algorithm into software. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm by Obaid, Zeyad Assi, Sulaiman, Nasri, Hamidon, Mohd Nizar

    Published 2009
    “…This method also enables us to design the controller to work as PDFLC, PIFLC or PIDFLC depending on two (one-bit) external signals with programmable fuzzy sets and programmable rule table using VHDL language for implementation on FPGA device, and to employ the new technique of fuzzy algorithm in order to serve a wide range of the physical systems which require a real-time operation. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An experimental validation and optimisation tool path strategy for thin walled structure by Alsultaney, Hazem K., Mohd Ariffin, Mohd Khairol Anuar, Baharudin, B. T. Hang Tuah, Ali, Aidy, Mustapha, Faizal

    Published 2011
    “…The target was to develop models which mimic the actual cutting process using the finite element method (FEM), to validate the developed tool path strategy algorithm with the actual machining process and to programme the developed algorithm into the software. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security by Hani, Mohamed Khalil, Sha'ameri, Ahmad Zuri, Chong, Wei Sheng

    Published 2000
    “…This paper presents a pipeline implementation of the Secure Hash Algorithm, SUA-I. This design is targeted for the Altera FlexlOKE50 Field Programmable Gate Array (FPGA) on a PCI card. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  20. 20

    Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification by Mohamed Ali, Mohamed Hassan

    Published 2017
    “…With those improvements in accuracy and the speed, the proposed algorithm contributes to the advancement of finger vein biometric system.…”
    Get full text
    Get full text
    Thesis