Search Results - (( code application ((a algorithm) OR (bees algorithm)) ) OR ( _ applications design algorithms ))*
Search alternatives:
- applications design »
- code application »
- bees algorithm »
- _ applications »
- a algorithm »
-
1
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
-
3
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
Get full text
Get full text
Thesis -
4
Enhanced algorithms for three-dimensional object interpreter
Published 2004Get full text
Get full text
Get full text
Thesis -
5
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
6
-
7
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…Up until today, video compression algorithm has been applied in various video applications ranging from video conferencing to video telephony. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi
Published 2012“…Therefore, acceleration of the motion estimation (ME) in H.264/AVC with efficient algorithms and architectures is essential for real-time applications. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Performance of MIMO space-time coded system and training based channel estimation for MIMO-OFDM system
Published 2006“…It should be mentioned that reduction of computational complexity of the channel estimation and data detection algorithm is a major challenge for receiver design in MIMO-OFDM system, and complication of receiver design is mostly due to these algorithms. …”
Get full text
Get full text
Thesis -
10
A secure cryptographic algorithm against side channel attacks
Published 2015Get full text
Get full text
Get full text
Article -
11
IMPLEMENTATION OF NOISE CANCELLATION WITH HARDWARE DESCRIPTION LANGUAGE
Published 2006Get full text
Get full text
Final Year Project -
12
-
13
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…Software prefetching has been shown to be effective in reducing memory stalls in array-based applications but not in pointer-based applications. This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Multilayers fast mode decision algorithm for scalable video coding: design, implementation, and streaming evaluation on IEEE 802.11g wireless LAN
Published 2011“…The advancement and development in video coding technology, together with the increase of storage capacity network infrastructures and computing power are enabling an increasing number of video applications. …”
Get full text
Get full text
Book -
15
-
16
-
17
Real-coded genetic algorithm for parametric modelling of a TRMS
Published 2009Get full text
Get full text
Get full text
Proceeding Paper -
18
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…This design presents the uses of sinusoidal pulse width modulation (SPWM) as a switching control for multilevel inverter by using CORDIC algorithm. …”
Get full text
Get full text
Student Project -
19
-
20
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article
