Search Results - (( code application system algorithm ) OR ( _ application during algorithms ))*
Search alternatives:
- application during »
- during algorithms »
- code application »
- system algorithm »
-
1
Enhanced algorithms for three-dimensional object interpreter
Published 2004Get full text
Get full text
Get full text
Thesis -
2
-
3
A study on channel coding for 5G / Xu Wei
Published 2019Get full text
Get full text
Get full text
Thesis -
4
Development of a scalable video compression algorithm
Published 2012“…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
Get full text
Get full text
Thesis -
6
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…Owing to the existing load balancing algorithms still experience server’s resource congestion and slow connection to the system resulted by sudden bursty demand of services especially during special events. …”
Get full text
Get full text
Get full text
Article -
7
Sensorless control system for assistive robotic ankle-foot
Published 2018“…Two-level control system is used to evaluate the estimation algorithms; the control system role is to mimic biological ankle-foot performance during normal ground level walking speed. …”
Get full text
Get full text
Article -
8
-
9
-
10
-
11
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
12
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Static analysis of Android apps for lifecycle conformance
Published 2017“…In addition, a novel code analysis algorithm is presented to show how Android application source code can be analyzed in order to verify that system resources have been correctly initiated and released. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC
Published 2011“…The recently developed Distributed Video Coding (DVC) is typically suitable for the applications where the conventional video coding is not feasible because of its inherent high-complexity encoding. …”
Get full text
Get full text
Thesis -
15
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
Get full text
Get full text
Student Project -
16
-
17
Assessment of ANN-based auto-reclosing scheme developed on single machine-infinite bus model with IEEE 14-bus system model data
Published 2009Get full text
Get full text
Conference or Workshop Item -
18
Optimization of operations of reservoir systems for hydropower generation in Tigris River Basin, Iraq
Published 2016“…This model has high reliability and can be used in real applications with various storage systems.Keywords: reservoir systems, optimization, simulation, optimal operation policy, genetic algorithms, Matlab, Simulink, hydropower generation, Tigris river basin, Iraq.…”
Get full text
Get full text
Thesis -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…The amount of Android malware has risen steeply during the last few years, making it the most targeted mobile operating system. …”
Get full text
Get full text
Get full text
Thesis -
20
A genetic algorithm to minimise the maximum lateness on a single machine family scheduling problem
Published 2009“…All algorithms are coded in ANSI-C using Microsoft Visual C++ 6.0 as the compiler, and run on a Pentium 4, 2.0 GHz computer with 2.0 GB RAM. …”
Get full text
Conference or Workshop Item
