Search Results - (( java implication based algorithm ) OR ( software programmer end algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…This would greatly shorten the instructions used by the algorithms and improved the execution time of the programmes. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3

    Making programmer effective for software development teams: An extended study by Gilal, A.R., Jaafar, J., Abro, A., Umrani, W.A., Basri, S., Omar, M.

    Published 2017
    “…In order to find the possible combination of personality types between team-leader and programmer, this study applied Genetic Algorithm (GA) and Johnson's Algorithm (JA) on data. …”
    Get full text
    Get full text
    Article
  4. 4

    Fiber-Wireless testbed using software defined radio for protocol and algorithm testing by Ridwan M.A., Mohamed Radzi N.A., Abdullah F.

    Published 2023
    “…Almost all recently proposed testbed designed for FiWi are using hardware that lacks in programmability feature, making it challenging to implement any protocols and algorithms. …”
    Article
  5. 5
  6. 6

    Method of Moment Analysis Using Open-Ended Coaxial Sensor in Determination of Corn Reflection Coefficient by Soleimani, Hojjatollah

    Published 2010
    “…Then, the various specializations are described, accompanied with relevant references to illustrate the pitfalls and shortcomings, as well as the advantages, as compared to other methods. So finally, their algorithms are easily programmable on computer. The computation of reflection coefficient of the corn was programmed using MATLAB software for the admittance approach and Method of Moment (MOM). …”
    Get full text
    Get full text
    Thesis
  7. 7

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…Likewise, the soft programmable switches that are directly connected to the controller running atop end host servers are attractive targets for attackers to initiate control plane flooding; apart from authorized but untrusted hosts. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Application Specific Instruction Set Processor (ASIP) Design In An 8-Bit Softcore Microcontroller by Salim, Sani Irwan, Soo, Yew Guan, Samsudin, Sharatul Izah

    Published 2018
    “…Although more applications seem to concentrate on software algorithms and wireless connectivity, the hardware side of the system is still occupied by microcontroller variants. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan by Nauman , Khan

    Published 2024
    “…The rise of software-defined networking (SDN) has revolutionized the networking industry, offering agility and flexibility through programmable networks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Bioinformatics analysis and spatiotemporal distribution of the f lic gene and its protein isolated from Escherichia coli-infected patients in Eastern Algeria by Harrar, Abdenassar, Awang Hamat, Rukman, Hamidechi, Mohamed Abdelhafid

    Published 2024
    “…Finally, a phylogenetic tree was constructed using the maximum likelihood algorithm in MEGA 11 software. Results: Bioinformatics analysis highlighted the strong conservation of the structures of the fliC protein sequences, especially at the two N- and C-terminal ends, and strong variability in the central zone. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Bioinformatics analysis and spatiotemporal distribution of the fliC gene and its protein isolated from Escherichia coli-infected patients in eastern Algeria by Harrar, Abdenassar, Hamat, Rukman Awang, Hamidechi, Mohamed Abdelhafid

    Published 2024
    “…Finally, a phylogenetic tree was constructed using the maximum likelihood algorithm in MEGA 11 software. Results: Bioinformatics analysis highlighted the strong conservation of the structures of the fliC protein sequences, especially at the two N-and C-terminal ends, and strong variability in the central zone. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
    Get full text
    Get full text
    Thesis