Search Results - (( technology implementation using algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- implementation using »
- java application »
- using algorithm »
-
1
Implementation of sinusoidal pulse width modulation based on cordic algorithm using silterra 0.18µm CMOS technology: article
Published 2009“…This thesis presents the implementation of Sinusoidal Pulse Width Modulation (SPWM) using Silterra 0.18µm technology and it is based on CORDIC algorithm. …”
Get full text
Get full text
Article -
2
Implementation of sinusoidal pulse width modulation based on cordic algorithm using silterra 0.18um CMOS technology / Nurul Hidayah Marzuki
Published 2009“…This thesis presents the implementation of Sinusoidal Pulse Width Modulation (SPWM) using Silterra 0.18um technology and it is based on CORDIC algorithm. …”
Get full text
Get full text
Thesis -
3
-
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
5
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Implementation of perez-dumortier calibration algorithm
Published 2014Get full text
Get full text
Get full text
Chapter In Book -
7
-
8
Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad
Published 2002“…Dynamic programming is used to solve Edit Distance problem. The approach has two main sections: the methodology used in implementing, and the result. …”
Get full text
Get full text
Thesis -
9
Implementation of booth multiplier algorithm using Radix-4 in FPGA
Published 2021“…The proposed design is simulated by using Verilog HDL in Quartus II and implemented in Cyclone II FPGA. …”
Get full text
Get full text
Get full text
Article -
10
Intruder detection using histogram and edge detection algorithms
Published 2016Get full text
Get full text
Undergraduates Project Papers -
11
A modification of Shamir's Three-Pass protocol by implementing one-time pad algorithm / Nur Khairunnisa' Kusman, Nurul Hanis Abd Rashid and An Nur Ameera Zamani
Published 2019“…As a result, this study success to develop the algorithm by implemented one-time pad in Shamir's three-pass protocol. …”
Get full text
Get full text
Student Project -
12
-
13
-
14
A hybrid algorithm for finding shortest path in network routing.
Published 2009Get full text
Article -
15
-
16
Convolution coder software implementation using VIiterbiDecoding algorithm
Published 2008Get full text
Get full text
Get full text
Proceeding Paper -
17
Optimal vehicle to grid planning and scheduling using double layer multi-objective algorithm
Published 2023“…Algorithms; Charging (batteries); Curve fitting; Electric load flow; Electric power systems; Electric vehicles; Energy management systems; Optimization; Reactive power; Real time control; Scheduling; Vehicles; Voltage control; Voltage regulators; Battery chargers; Bidirectional power flow; Multi objective algorithm; Optimization algorithms; Reactive power compensation; Real-time implementations; Revolutionary technology; Vehicle to grids; Electric power transmission networks; algorithm; electric vehicle; electricity supply; energy flow; energy planning; energy use; optimization; technological development…”
Article -
18
Literature Survey On Stereo Vision Disparity Map Algorithms
Published 2016Get full text
Get full text
Get full text
Article -
19
-
20
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis
