Search Results - (( java implication based algorithm ) OR ( software programmer case algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1
  2. 2
  3. 3

    Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm by Obaid, Zeyad Assi, Sulaiman, Nasri, Hamidon, Mohd Nizar

    Published 2009
    “…This method also enables us to design the controller to work as PDFLC, PIFLC or PIDFLC depending on two (one-bit) external signals with programmable fuzzy sets and programmable rule table using VHDL language for implementation on FPGA device, and to employ the new technique of fuzzy algorithm in order to serve a wide range of the physical systems which require a real-time operation. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…In this paper, a development of low-cost RSA-based Crypto Embedded System targeted for electronic document security is presented. The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  7. 7

    Development of oil palm fresh fruit bunch maturity assessment software for personal digital assistant by Kavandi, Nader

    Published 2011
    “…The software allows the user to take a picture from the FFBs using the built-in camera of the PDA and analyze it inside the PDA using a wisely implemented Hue based image processing algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…The revolutionary concept of Software Defined Networks (SDNs) potentially provides flexible and well-managed next-generation networks. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. Hence, there is a need for development of techniques and schemes to obfuscate sensitive parts of software to protect it from reverse engineering attacks. …”
    Get full text
    Get full text
    Thesis
  13. 13