Search Results - (( java implication based algorithm ) OR ( software programmer end algorithm ))
Search alternatives:
- implication based »
- java implication »
- programmer end »
- end algorithm »
-
1
RISC-V instruction set extension on blockchain application
Published 2024“…This would greatly shorten the instructions used by the algorithms and improved the execution time of the programmes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
-
3
Making programmer effective for software development teams: An extended study
Published 2017“…In order to find the possible combination of personality types between team-leader and programmer, this study applied Genetic Algorithm (GA) and Johnson's Algorithm (JA) on data. …”
Get full text
Get full text
Article -
4
Fiber-Wireless testbed using software defined radio for protocol and algorithm testing
Published 2023“…Almost all recently proposed testbed designed for FiWi are using hardware that lacks in programmability feature, making it challenging to implement any protocols and algorithms. …”
Article -
5
-
6
Method of Moment Analysis Using Open-Ended Coaxial Sensor in Determination of Corn Reflection Coefficient
Published 2010“…Then, the various specializations are described, accompanied with relevant references to illustrate the pitfalls and shortcomings, as well as the advantages, as compared to other methods. So finally, their algorithms are easily programmable on computer. The computation of reflection coefficient of the corn was programmed using MATLAB software for the admittance approach and Method of Moment (MOM). …”
Get full text
Get full text
Thesis -
7
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…Likewise, the soft programmable switches that are directly connected to the controller running atop end host servers are attractive targets for attackers to initiate control plane flooding; apart from authorized but untrusted hosts. …”
Get full text
Get full text
Thesis -
8
Application Specific Instruction Set Processor (ASIP) Design In An 8-Bit Softcore Microcontroller
Published 2018“…Although more applications seem to concentrate on software algorithms and wireless connectivity, the hardware side of the system is still occupied by microcontroller variants. …”
Get full text
Get full text
Get full text
Article -
9
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
Published 2024“…The rise of software-defined networking (SDN) has revolutionized the networking industry, offering agility and flexibility through programmable networks. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
12
Bioinformatics analysis and spatiotemporal distribution of the f lic gene and its protein isolated from Escherichia coli-infected patients in Eastern Algeria
Published 2024“…Finally, a phylogenetic tree was constructed using the maximum likelihood algorithm in MEGA 11 software. Results: Bioinformatics analysis highlighted the strong conservation of the structures of the fliC protein sequences, especially at the two N- and C-terminal ends, and strong variability in the central zone. …”
Get full text
Get full text
Get full text
Article -
13
Bioinformatics analysis and spatiotemporal distribution of the fliC gene and its protein isolated from Escherichia coli-infected patients in eastern Algeria
Published 2024“…Finally, a phylogenetic tree was constructed using the maximum likelihood algorithm in MEGA 11 software. Results: Bioinformatics analysis highlighted the strong conservation of the structures of the fliC protein sequences, especially at the two N-and C-terminal ends, and strong variability in the central zone. …”
Get full text
Get full text
Get full text
Article -
14
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
Get full text
Get full text
Thesis
