Search Results - (( using function path algorithm ) OR ( data integration using algorithm ))
Search alternatives:
- integration using »
- data integration »
- using algorithm »
- using function »
- path algorithm »
- function path »
-
1
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…Proposed framework uses an integrated functional RTL circuit, called assignment decision diagram (ADD) which target at structural-level. …”
Get full text
Get full text
Conference or Workshop Item -
2
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…Proposed framework uses an integrated functional RTL circuit, called assignment decision diagram (ADD) which target at structural-level. …”
Get full text
Get full text
Article -
3
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. …”
Get full text
Get full text
Thesis -
4
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
5
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Design and analysis multiple paths trace back and reconstruction module for DNA sequence alignment accelerator using ASIC design flow: article / Nurul Ain Husaini
Published 2010“…The first objective is to construct the trace back and reconstruction module of the S-W algorithm with the multiple blocks and the functionality for each block. …”
Get full text
Get full text
Article -
7
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…A model-driven approach was used for generating abstract test cases from the feasible paths. …”
Get full text
Get full text
Get full text
Thesis -
8
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Improving Network Consistency and Data Availability Using Fuzzy C Mean Clustering Algorithm in Wireless Sensor Networks
Published 2024thesis::doctoral thesis -
10
Genetic algorithm for control and optimisation of exothermic batch process
Published 2013“…As a result, improved multivariable genetic algorithm (IMGA) with adaptable fitness function ability is introduced in this work. …”
Get full text
Get full text
Get full text
Thesis -
11
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…Extensive computations utilizing MATLAB 2018a on the Intel Core i7/Gen 10 processor and 16 GB of RAM are used to evaluate the algorithm efficacy. According to the blueprint of our heuristic method, the allocation and the optimum number of controllers under an effective decentralized policy could achieve higher efficiency. …”
Get full text
Get full text
Thesis -
12
Alternative solar-battery charge controller to improve system efficiency
Published 2015“…This paper proposed a high efficiency solar-battery charge controller as an alternative to that controller which is used in most conventional residential solar system , the concept of the proposed controller circuit based on using the off state energy duration of the overcharge current in a separate path, this energy delivers to auxiliary battery or direct load, such as fans, used to cool or ventilate the system components and consequently improving system performance, where the overcharge current refer to that current available stand by when the battery fully charged or reached its maximum charge voltage. …”
Get full text
Get full text
Article -
13
-
14
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…The subject of this thesis is the study of collision resistant hash function. A cryptographic hash function is one of the cryptographic primitives designed to protect the integrity of data such as that in digital signatures and online business transactions. …”
Get full text
Get full text
Thesis -
15
Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller
Published 2010“…This algorithm encode a potential solution to a specific problem on a simple chromosome like data structure and apply recombination operators to this structure to preserve critical information. …”
Get full text
Thesis -
16
A-star (A*) algorithm implementation for robotics path planning navigation
Published 2018“…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah
Published 1997“…The euler's path it using pseudo input and Heuristic algorithm to find the minimum interlace. …”
Get full text
Get full text
Thesis -
18
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Conference Paper -
19
Hybrid path planning for indoor robot with Laplacian Behaviour-based control via four point-explicit group
Published 2014“…Consequently, the gradient of the potential functions would be used by the searching algorithm to generate path from starting to goal location. …”
Get full text
Get full text
Get full text
Article -
20
Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control
Published 2016“…However, this assumption may lead to inaccurate secondary path model. In this work, the modelling of acoustic path using FIR filters is incorporated for both algorithms for Wiener-Hammerstein structure. …”
Get full text
Get full text
Thesis
