Search Results - (( java implication based algorithm ) OR ( software programmers _ algorithm ))

Refine Results
  1. 1
  2. 2

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…This would greatly shorten the instructions used by the algorithms and improved the execution time of the programmes. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Making programmer effective for software development teams: An extended study by Gilal, A.R., Jaafar, J., Abro, A., Umrani, W.A., Basri, S., Omar, M.

    Published 2017
    “…In order to find the possible combination of personality types between team-leader and programmer, this study applied Genetic Algorithm (GA) and Johnson's Algorithm (JA) on data. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7

    Literature Survey On Stereo Vision Disparity Map Algorithms by Rostam Affendi, Hamzah, Haidi, Ibrahim

    Published 2016
    “…The survey also notes the implementation of previous software-based and hardware-based algorithms. Generally, the main processing module for a software-based implementation uses only a central processing unit. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    FPGA based Twofish Algorithm by Muhammad Imran, Ahmad, Mohd Nazrin, Md Isa, Abdul Halis, Abdul Aziz, Mohd Fisol, Osman

    Published 2009
    “…This paper presents the architecture of Twofish algorithm implemented with field programmable gate array (FPGA). …”
    Get full text
    Working Paper
  9. 9

    Compiler-based prefetching algorithm for recursive data structure by Anuar, Nurulhaini

    Published 2007
    “…One of the techniques has recently used was Software Prefetching. Software prefetching relies on the programmer or compiler to insert explicit prefetch instructions into the application code for memory references that are likely to miss in the cache. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Implementation of PRINCE algorithm in FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R., Rusli M.E., Tariq B.

    Published 2023
    “…Algorithms; Application programs; Cryptography; Field programmable gate arrays (FPGA); Hardware; Hardware security; High speed cameras; Integrated circuit design; Logic Synthesis; Security of data; Throughput; Architectural modeling; Block ciphers; Cryptographic algorithms; Hardware implementations; PRINCE; Software implementation; Very high speed integrated circuits; VHDL; Computer hardware description languages…”
    Conference Paper
  11. 11

    Hardware And Software Partitioning Using Genetic Algorithm In Image Processing Application by Loo, Fang Hean

    Published 2018
    “…In this project, HW-SW Partitioning is used as a process to map each task of image processing application to be executed either in software (Hard Processor System, HPS) or hardware (Field Programmable Gate Array, FPGA). …”
    Get full text
    Get full text
    Monograph
  12. 12

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…Traditional Encryption Algorithms are implemented in software base because of the complexities involved in the operations. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Fiber-Wireless testbed using software defined radio for protocol and algorithm testing by Ridwan M.A., Mohamed Radzi N.A., Abdullah F.

    Published 2023
    “…Almost all recently proposed testbed designed for FiWi are using hardware that lacks in programmability feature, making it challenging to implement any protocols and algorithms. …”
    Article
  14. 14

    Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi by Muniyandi, Chandren, Maroosi, Ali

    Published 2015
    “…Algorithm visualisation (AV) can be utilised to improve students ’programming and programme comprehension skills. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    OPTIMAL DATAPATH DESIGN FOR A CRYPTOGRAPHIC PROCESSOR: THE BLOWFISH ALGORITHM by Zain Ali, Noohul Basheer, Noras, James

    Published 2001
    “…BLOWFISH is a fast cryptographic software algorithm, using the operations of addition, XOR and look-up tables. …”
    Get full text
    Get full text
    Article
  16. 16

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…The main aim of this research is to compute the discrete eigenvalues and visualize the eigenfunctions for the modular group, commutator subgroup and principal congruence subgroup of level two in a parallel computing environment using GridMathematica software. Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Develpoment of combinatorial optimisation for cutting tool path strategy by Alsultaney, Hazem K., Mohd Ariffin, Mohd Khairol Anuar, Baharudin, B. T. Hang Tuah, Ali, Aidy, Mustapha, Faizal

    Published 2009
    “…The target was to develop models which mimic the actual cutting process using the Finite Element Method (FEM) and to validate the developed tool path strategy algorithm with the actual machining process and to programmer the developed algorithm into software. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Design and development of a programmable painting robot for houses and buildings by Aris, I., Parvez Iqbal, A. K. M., Ramli, A. R., Shamsuddin, S.

    “…The System Is Divided Into Two Main Parts Namely Hardware And Software. In Hardware Part, Mechanical Design, Fabrication, Electrical And Electronics System Are Described And In Software Part, Control Algorithm Is Explained. …”
    Get full text
    Get full text
    Article
  19. 19

    Design and development of a programmable painting robot for houses and buildings by Aris, A. K. M., Iqbal, Parvez, Ramli, A. R., Shamsuddin, S

    Published 2005
    “…The system is divided into two main parts namely hardware and software. In hardware part, mechanical design, fabrication, electrical and electronics system are described and in software part, control algorithm is explained. …”
    Get full text
    Get full text
    Article
  20. 20

    An experimental validation and optimisation tool path strategy for thin walled structure by Alsultaney, Hazem K., Mohd Ariffin, Mohd Khairol Anuar, Baharudin, B. T. Hang Tuah, Ali, Aidy, Mustapha, Faizal

    Published 2011
    “…The target was to develop models which mimic the actual cutting process using the finite element method (FEM), to validate the developed tool path strategy algorithm with the actual machining process and to programme the developed algorithm into the software. …”
    Get full text
    Get full text
    Get full text
    Article