Search Results - (( programmes _ coding algorithm ) OR ( java application reoptimize algorithm ))
Search alternatives:
- application reoptimize »
- coding algorithm »
- java application »
-
1
FPGA Implementation of Emergency Door Car Entry System
Published 2008“…Emergency door car entry system can be implemented using Field Programmable Gate Array (FPGA) board. FPGA board is a board that can be programmed using source code to run the application that has been downloaded into it. …”
Get full text
Learning Object -
2
RISC-V instruction set extension on blockchain application
Published 2024“…This would greatly shorten the instructions used by the algorithms and improved the execution time of the programmes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Booth’s Algorithm Design Using Field Programmable Gate Array
Published 2014Get full text
Get full text
Get full text
Article -
4
Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes
Published 2007“…Since programming is not very exact and can be considered partially art then the Genetic Algorithm is not designed to be fully autonomous and programmers hand still have to be there, but with much reduced work.…”
Get full text
Get full text
Research Report -
5
Simplified VHDL Coding of Modified Non-Restoring Square Root Calculator
Published 2012“…This paper offers universal and shortest VHDL coding of modified non-restoring square root calculator. …”
Get full text
Get full text
Article -
6
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…All these design methodologies aim to confirm the effect of HDL coding style on the performance of hardware algorithms implemented on FPGA. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Agent-based extraction algorithm for computational problem solving
Published 2015“…Additionally, IPO_Agent not only produces the same PAC’s output results, but also generates module number and represents these results in another window. Finally,Algorithm_Agent employs the extracted information provided by IPO_Agent to produce the pseudo-code of the given problem and shows it in separate window. …”
Get full text
Get full text
Thesis -
11
Design of a reconfigurable computing platform
Published 2023“…The RCP utilizes Impulse CoDeveloper which is an electronic system level (ESL) design tool that compiles sequential applications/algorithms in C to synthesizable HDL. A customized platform support package (PSP) was developed within the Impulse CoDeveloper environment to enable the Impulse tools to automatically generate the HDL files and C source codes with supported hardware and software interfaces that is targeted for the RCP. …”
Conference paper -
12
Reusable data-path architecture for encryption-then-authentication on FPGA
Published 2023“…For this proposed reusable data-path, we have chosen LED algorithm for encryption and then PHOTON to generate the MAC code. …”
Article -
13
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…The hardware based of encryption chip become realizable with Field Programmable Gate Arrays (FPGAs). There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
14
The design of viterbi decoder for low power consumption space time trellis code without adder architecture using RTL model
Published 2016“…Purpose – This paper aims to describe the real-time design and implementation of a Space Time Trellis Code decoder using Altera Complex Programmable Logic Devices (CPLD). …”
Get full text
Get full text
Get full text
Article -
15
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…This best algorithm consists of greedy prefetching and prefetch array algorithms. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Framework of Designing Multiple Microcontroller Based Applications
Published 2011“…These are presented in the second part of the paper describing the software part of the framework, which besides programming tools also discusses the code development tools. The stress is given to the use of assembly code and high-level tools, where the algorithms are described in the form of different graphical notations, i.e. block diagrams. …”
Get full text
Get full text
Conference or Workshop Item -
18
Framework of Multi-Microcontroller Evaluation Tool for a use of Academic Environment
Published 2012“…These are presented in the second part of the paper describing the software part of the framework, which besides programming tools also discusses the code development tools. The stress is given to the use of assembly code and high-level tools, where the algorithms are described in the form of different graphical notations, i.e. block diagrams. …”
Get full text
Get full text
Get full text
Article -
19
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation techniques allow the programmer to customize which part of the code to be obfuscated. …”
Get full text
Get full text
Thesis -
20
Design and analysis of high performance matrix filling for DNA sequence alignment accelerator using asic design flow: article / Nurzaima Mahmod
“…In the advanced engineering technology, the massive parallelism can be implemented by using the Field Programmable Logic Array (FPGA) techniques. The design was developed in Verilog HDL coding and synthesis by using LINUX tools. …”
Get full text
Get full text
Article
