Search Results - (( programme a function algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- application modified »
- function algorithm »
- java application »
- programme a »
- a function »
-
1
Challenges of hidden data in the unused area two within executable files
Published 2009“…There are many challenges of hidden data in the unused area two within executable files, which is dependencies of the size of the cover file with the size of hidden information, differences of the size of file before and after the hiding process, availability of the cover file after the hiding process to perform normally and detection by antivirus software as a result of changes made to the file. Approach: The system designed to accommodate the release mechanism that consists of two functions; first is the hiding of the information in the unused area 2 of PE-file (exe.file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). …”
Get full text
Get full text
Get full text
Article -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
-
4
RISC-V instruction set extension on blockchain application
Published 2024“…However, blockchain required a high computing power to function. Although there were numerous ways to improve the performance speed of blockchain technology in software implementations, hardware implementation of the blockchain algorithms was a more preferred choice due to the emerging open-source computer architecture, RISC-V. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…For this purpose, cryptography hash functions are selected as a design target. These algorithms have been studied to improve the speed, area implementation, and power consumption. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
-
10
IMAGE PROCESSING ALGORITHMS ON FPGA
Published 2007“…The objective of this project is to construct a real time hardware image processing system which based on Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Final Year Project -
11
Implementation of Color Filtering on FPGA
Published 2007“…The chosen image processing algorithm is a single Color Filtering algorithm. This work utilizes Altera DE2 development board empowered by the Cyclone II FPGA paired with a 1.3 Mega pixel CMOS camera from Terasik Technologies. …”
Get full text
Get full text
Conference or Workshop Item -
12
Adaptable algorithms for performance optimization of dynamic batch manufacturing processes
Published 2018“…Various algorithms are designed, formulated and computed in MATLAB and then embedded to a real-time programmable microcontroller. …”
Get full text
Get full text
Get full text
Thesis -
13
VHDL modeling and simulation of the back-propagation algorithm and its mapping to the RM
Published 1993Get full text
Get full text
Get full text
Proceeding Paper -
14
Implementation of integral control state feedback controller on prasmatic control of universal strech and bending machine (USBM) simplified model
Published 2008“…It is important to verify simulation result through experiment and compare it with expected result. As we know, many functions can be implemented using Programmable Logic Controller (PLC). …”
Get full text
Get full text
Undergraduates Project Papers -
15
Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm
Published 2009“…This method also enables us to design the controller to work as PDFLC, PIFLC or PIDFLC depending on two (one-bit) external signals with programmable fuzzy sets and programmable rule table using VHDL language for implementation on FPGA device, and to employ the new technique of fuzzy algorithm in order to serve a wide range of the physical systems which require a real-time operation. …”
Get full text
Get full text
Get full text
Article -
16
Improved genetic algorithm for direct current motor high speed controller implemented on field programmable gate array
Published 2019“…On the one side, the estimation Transfer Function (TF) of these motors is considered a significant problem in most previous studies which causes bad controller design, if the low estimation accuracy. …”
Get full text
Get full text
Thesis -
17
Design and implementation of multimedia digital matrix system
Published 2005“…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Implementing wireless monitoring for substations on the field programmable logic arrays (FPGA)
Published 2023Conference paper -
20
Implementation of color filtering on FPGA
Published 2007“…The chosen image processing algorithm is a single Color Filtering algorithm. This work utilizes Altera DE2 development board empowered by the Cyclone II FPGA paired with a 1.3 Mega pixel CMOS camera from Terasik Technologies. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
