Search Results - (( programmes from path algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- programmes from »
- path algorithm »
- from path »
-
1
-
2
Vision aided path planning for mobile robot
Published 2014Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
Published 2006“…Big volume data needs to be transferred from one location to another through communication path but exposes to attackers. …”
Get full text
Get full text
Thesis -
4
-
5
A review on path collisions and resources usage in hybrid optical Network on Chip (HONoC)
Published 2023Conference Paper -
6
-
7
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
8
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…The separation of control functionality from forwarding devices brings orchestration and management to enable 5G network programmability. …”
Get full text
Get full text
Thesis -
9
Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui
Published 2016“…This thesis aimed to investigate and develop a novel parameterized architecture design for SENSE algorithm. The proposed design is implemented on Field Programmable Gate Arrays (FPGAs) platform, which can provide real-time SENSE reconstruction right on the receiver coil data acquisition system with no need to transfer data to the MRI server. …”
Get full text
Get full text
Get full text
Thesis -
10
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…Static analysis is devoted to identifying candidate pairs of vulnerable paths to second-order SQLI. It statically detects when the data comes from tainted sources, when they are stored in the back-end database, and when they are retrieved later in another point to build a new SQL statement without proper sanitisation. …”
Get full text
Get full text
Thesis
