Search Results - (( its application during algorithm ) OR ( based application design algorithm ))*
Search alternatives:
- application during »
- application design »
- based application »
- during algorithm »
- design algorithm »
- its application »
-
1
'Cruise-and-Collect' algorithm for an ARM-based autonomous robot
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
-
4
-
5
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…Moreover, other than the memory-based feature, SED algorithm has fewer design parameters to be addressed and the independence of the gain sequence in the tuning process. …”
Get full text
Get full text
Thesis -
6
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…Moreover, other than the memory-based feature, SED algorithm has fewer design parameters to be addressed and the independence of the gain sequence in the tuning process. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
Design and development of sensor based traffic light system
Published 2006Get full text
Get full text
Get full text
Article -
10
Photovoltaic-based single-ended primary-inductor converter with dual-fuzzy logic control-based maximum power point tracking
Published 2016“…Among renewable energy sources, solar energy used in photovoltaic (PV) system is the most favorite list in renewable energy researches today. Due to its maintenance free, ease of implementation and free of pollution, its demand increases rapidly in residential and industrial applications. …”
Get full text
Get full text
Thesis -
11
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Development of an efficient algorithm for fetal heart rate detection: a hardware approach
Published 2006Get full text
Get full text
Get full text
Proceeding Paper -
14
Enhanced algorithms for three-dimensional object interpreter
Published 2004Get full text
Get full text
Get full text
Thesis -
15
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…Finally, the algorithm Void Avoidance Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with the communication void by introducing a simple method to detect a void node and avoid it during the forwarding process. …”
Get full text
Get full text
Thesis -
17
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
18
Ant system with heuristics for capacitated vehicle routing problem
Published 2013Get full text
Get full text
Thesis -
19
-
20
