Search Results - (( program usage modified algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- java application »
- usage modified »
- program usage »
-
1
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. …”
Get full text
Get full text
Get full text
Article -
2
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. …”
Get full text
Get full text
Get full text
Article -
3
Energy Management System For Controlling Series Hybrid Electric Motorcycle
Published 2016“…The characteristics identified from the dynamic programming were then used for the formulation of the energy management system. …”
Get full text
Get full text
Thesis -
4
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
Get full text
Get full text
Final Year Project -
5
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
Get full text
Conference or Workshop Item -
6
Energy Management System For Controlling Series Hybrid Electric Motorcycle
Published 2016“…Tuning and adaptation of the control algorithm had been demonstrated so developers can make use of them for their applications. …”
Get full text
Get full text
Thesis
