Search Results - (( using function path algorithm ) OR ( data integration path algorithm ))
Search alternatives:
- data integration »
- integration path »
- using function »
- path algorithm »
- function path »
-
1
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
2
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article -
3
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
Get full text
Thesis -
4
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…A model-driven approach was used for generating abstract test cases from the feasible paths. …”
Get full text
Get full text
Get full text
Thesis -
5
Design and analysis multiple paths trace back and reconstruction module for DNA sequence alignment accelerator using ASIC design flow: article / Nurul Ain Husaini
Published 2010“…The first objective is to construct the trace back and reconstruction module of the S-W algorithm with the multiple blocks and the functionality for each block. …”
Get full text
Get full text
Article -
6
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. …”
Get full text
Get full text
Thesis -
7
Improving Network Consistency and Data Availability Using Fuzzy C Mean Clustering Algorithm in Wireless Sensor Networks
Published 2024thesis::doctoral thesis -
8
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Genetic algorithm for control and optimisation of exothermic batch process
Published 2013“…Although the proposed genetic algorithm controller (GAC) is able to regulate the process temperature to the desired path, it does not limit the waste production effectively. …”
Get full text
Get full text
Get full text
Thesis -
12
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…The subject of this thesis is the study of collision resistant hash function. A cryptographic hash function is one of the cryptographic primitives designed to protect the integrity of data such as that in digital signatures and online business transactions. …”
Get full text
Get full text
Thesis -
13
Alternative solar-battery charge controller to improve system efficiency
Published 2015“…A Simulink Matlab simulator is attempted in the simulation phase of this research as well as an experimental data has been collected to verify the circuit function and energy saving goal.…”
Get full text
Get full text
Article -
14
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…Integrating Software Defined Networking (SDN) with Network Function Virtualization (NFV) is a low-cost way to build a reconfigurable network, reduce operating costs, and optimize network performance. …”
Get full text
Get full text
Thesis -
15
Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller
Published 2010“…This algorithm encode a potential solution to a specific problem on a simple chromosome like data structure and apply recombination operators to this structure to preserve critical information. …”
Get full text
Thesis -
16
Integrated robotic arm control: inverse kinematics, trajectory planning, and performance evaluation for automated welding
Published 2023“…An experimental setup involving a robotic arm controlled by an Arduino Mega 2560 microcontroller, embedded with the inverse kinematic algorithm and trajectory planning, is executed. Data acquisition involves inputting coordinates and orientation for automatic welding along a straight path. …”
Get full text
Get full text
Get full text
Article -
17
A-star (A*) algorithm implementation for robotics path planning navigation
Published 2018“…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah
Published 1997“…The euler's path it using pseudo input and Heuristic algorithm to find the minimum interlace. …”
Get full text
Get full text
Thesis -
19
Enhancing navigation accuracy of Turtlebot3 Burger mobile robot
Published 2024“…The basic navigation of the robot requires a significant amount of data and resources to process the output path. To address this challenge, the Kalman Filter algorithm is implemented in this robot, as it is widely used for mobile robot navigation and system integration. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Conference Paper
