Search Results - (( java implication based algorithm ) OR ( software programmers a algorithm ))
Search alternatives:
- software programmers »
- implication based »
- java implication »
- programmers a »
- a algorithm »
-
1
-
2
RISC-V instruction set extension on blockchain application
Published 2024“…However, blockchain required a high computing power to function. Although there were numerous ways to improve the performance speed of blockchain technology in software implementations, hardware implementation of the blockchain algorithms was a more preferred choice due to the emerging open-source computer architecture, RISC-V. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Making programmer effective for software development teams: An extended study
Published 2017“…In the same way, male programmer can work in a good way with male leaders or other way around for females. …”
Get full text
Get full text
Article -
4
Booth’s Algorithm Design Using Field Programmable Gate Array
Published 2014Get full text
Get full text
Get full text
Article -
5
Literature Survey On Stereo Vision Disparity Map Algorithms
Published 2016“…The survey also notes the implementation of previous software-based and hardware-based algorithms. Generally, the main processing module for a software-based implementation uses only a central processing unit. …”
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
-
9
FPGA based Twofish Algorithm
Published 2009“…This paper presents the architecture of Twofish algorithm implemented with field programmable gate array (FPGA). …”
Get full text
Working Paper -
10
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…Regarding to this problem, it has become necessary for us to have a better compiler optimization techniques. One of the techniques has recently used was Software Prefetching. …”
Get full text
Get full text
Get full text
Thesis -
11
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…Cryptography has a long and fascinating history. Traditional Encryption Algorithms are implemented in software base because of the complexities involved in the operations. …”
Get full text
Get full text
Monograph -
12
Hardware And Software Partitioning Using Genetic Algorithm In Image Processing Application
Published 2018“…In this project, HW-SW Partitioning is used as a process to map each task of image processing application to be executed either in software (Hard Processor System, HPS) or hardware (Field Programmable Gate Array, FPGA). …”
Get full text
Get full text
Monograph -
13
Fiber-Wireless testbed using software defined radio for protocol and algorithm testing
Published 2023“…In this paper, a reprogrammable FiWi testbed using software-defined radio (SDR) is proposed. …”
Article -
14
Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi
Published 2015“…Algorithm visualisation (AV) can be utilised to improve students ’programming and programme comprehension skills. …”
Get full text
Get full text
Get full text
Article -
15
OPTIMAL DATAPATH DESIGN FOR A CRYPTOGRAPHIC PROCESSOR: THE BLOWFISH ALGORITHM
Published 2001“…BLOWFISH is a fast cryptographic software algorithm, using the operations of addition, XOR and look-up tables. …”
Get full text
Get full text
Article -
16
Design and development of a programmable painting robot for houses and buildings
“…To Overcome This Difficulty, A Programmable Painter Robotic System Is Proposed, Designed And Developed. …”
Get full text
Get full text
Article -
17
Design and development of a programmable painting robot for houses and buildings
Published 2005“…To overcome this difficulty, a programmable painter robotic system is proposed, designed and developed. …”
Get full text
Get full text
Article -
18
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009“…The target was to develop models which mimic the actual cutting process using the Finite Element Method (FEM) and to validate the developed tool path strategy algorithm with the actual machining process and to programmer the developed algorithm into software. …”
Get full text
Get full text
Conference or Workshop Item -
19
Parallel computation of maass cusp forms using mathematica
Published 2013“…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
Get full text
Get full text
Thesis -
20
An experimental validation and optimisation tool path strategy for thin walled structure
Published 2011“…The target was to develop models which mimic the actual cutting process using the finite element method (FEM), to validate the developed tool path strategy algorithm with the actual machining process and to programme the developed algorithm into the software. …”
Get full text
Get full text
Get full text
Article
