Search Results - (( software programmer gaining algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- programmer gaining »
- gaining algorithm »
- implication based »
- java implication »
-
1
Implementation of PID controller on revolute control of universal strech and bending machine (USBM) simplified model
Published 2008“…After that the controller and DC motor are interfaced using Programmable Logic Controller, PLC. Using PLC, the controller is algorithm is implemented by using ladder diagram in CX-programmer software …”
Get full text
Get full text
Undergraduates Project Papers -
2
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
Published 2000“…This paper presents a pipeline implementation of the Secure Hash Algorithm, SUA-I. This design is targeted for the Altera FlexlOKE50 Field Programmable Gate Array (FPGA) on a PCI card. …”
Get full text
Get full text
Conference or Workshop Item -
3
The memory-less method of generating multiplicative inverse values for S-box in AES algorithm
Published 2009Get full text
Working Paper -
4
-
5
BinDCT Design and Implementation on FPGA with Low Power Architecture
Published 2008“…In this work, the design and implementation of 8 x 8 block 2-D forward BinDCT algorithm on a Field Programmable Gate Array (FPGA) is presented. …”
Get full text
Get full text
Thesis -
6
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
7
Implementation Of SVM For Cascaded H-Bridge Multilevel Inverters Utilizing FPGA
Published 2019“…In recent years the Space Vector Modulation (SVM) technique has gained wide acceptance for many AC drive applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
Get full text
Get full text
Thesis
