Search Results - (( based identification path algorithm ) OR ( java application _ algorithm ))
Search alternatives:
- based identification »
- identification path »
- java application »
- path algorithm »
-
1
-
2
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
3
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article -
4
Comparative Study of Weighted Product–Dijkstra’s Algorithm and All Possible Path Approach Based on Multiple Criteria and Multi-Dimensions
Published 2020“…All Possible Path Algorithm (APPA) was another algorithm that was also used to rank all the alternatives path based on multiple criteria. …”
Get full text
Get full text
Get full text
Article -
5
-
6
-
7
-
8
-
9
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
10
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
13
-
14
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
15
-
16
Systematic design of chemical reactors with multiple stages via multi-objective optimization approach
Published 2015“…Specifically, multi-objective optimization method will be used to generate Pareto optimal solutions that characterize the non-inferior solutions set for the problem. Following the identification of path-dependent design variables, several (possibly conflicting) design objectives will be selected and solutions of the corresponding problem will be generated from multi-objective optimization algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
17
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter -
18
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…Subsequently, the THF modelling scheme can be incorporated into an established real time NLFXLMS algorithm termed THF-NLFXLMS algorithm. The developed THF-NLFXLMS algorithm is tested by means of simulation and implemented experimentally using FPGA-based real time controller for a nonlinear ANC application. …”
Get full text
Get full text
Thesis -
19
Adaptive model predictive control based on wavelet network and online sequential extreme learning machine for nonlinear systems
Published 2015“…An analytical analysis based on ELM theories presented to prove the capability of the LWN to support the OSELM algorithm (LWN-OSELM). …”
Get full text
Get full text
Thesis -
20
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
