Search Results - (( java implication based algorithm ) OR ( software programmer case algorithm ))
Search alternatives:
- implication based »
- java implication »
- programmer case »
- case algorithm »
-
1
Booth’s Algorithm Design Using Field Programmable Gate Array
Published 2014Get full text
Get full text
Get full text
Article -
2
-
3
Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm
Published 2009“…This method also enables us to design the controller to work as PDFLC, PIFLC or PIDFLC depending on two (one-bit) external signals with programmable fuzzy sets and programmable rule table using VHDL language for implementation on FPGA device, and to employ the new technique of fuzzy algorithm in order to serve a wide range of the physical systems which require a real-time operation. …”
Get full text
Get full text
Get full text
Article -
4
-
5
-
6
Crypto Embedded System for Electronic Document
Published 2006“…In this paper, a development of low-cost RSA-based Crypto Embedded System targeted for electronic document security is presented. The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
7
Development of oil palm fresh fruit bunch maturity assessment software for personal digital assistant
Published 2011“…The software allows the user to take a picture from the FFBs using the built-in camera of the PDA and analyze it inside the PDA using a wisely implemented Hue based image processing algorithm. …”
Get full text
Get full text
Thesis -
8
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…The revolutionary concept of Software Defined Networks (SDNs) potentially provides flexible and well-managed next-generation networks. …”
Get full text
Get full text
Thesis -
9
-
10
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
11
-
12
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. Hence, there is a need for development of techniques and schemes to obfuscate sensitive parts of software to protect it from reverse engineering attacks. …”
Get full text
Get full text
Thesis -
13
