Search Results - (( software programmer gaining algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Implementation of PID controller on revolute control of universal strech and bending machine (USBM) simplified model by Norasyikin, Julis

    Published 2008
    “…After that the controller and DC motor are interfaced using Programmable Logic Controller, PLC. Using PLC, the controller is algorithm is implemented by using ladder diagram in CX-programmer software …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security by Hani, Mohamed Khalil, Sha'ameri, Ahmad Zuri, Chong, Wei Sheng

    Published 2000
    “…This paper presents a pipeline implementation of the Secure Hash Algorithm, SUA-I. This design is targeted for the Altera FlexlOKE50 Field Programmable Gate Array (FPGA) on a PCI card. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4
  5. 5

    BinDCT Design and Implementation on FPGA with Low Power Architecture by Jabbar, Mohamad Hairol

    Published 2008
    “…In this work, the design and implementation of 8 x 8 block 2-D forward BinDCT algorithm on a Field Programmable Gate Array (FPGA) is presented. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Implementation Of SVM For Cascaded H-Bridge Multilevel Inverters Utilizing FPGA by Al-Jewari, Maher Abd Ibrahim

    Published 2019
    “…In recent years the Space Vector Modulation (SVM) technique has gained wide acceptance for many AC drive applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
    Get full text
    Get full text
    Thesis