Showing 41 - 60 results of 309 for search '(((( implementing ii algorithm ) OR ( element method algorithm ))) OR ( level coding algorithm ))*', query time: 0.16s Refine Results
  1. 41

    A Comparative Study of Elgamal Based Cryptographic Algorithms by Haraty, Ramzi A.

    Published 2004
    “…To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 42
  3. 43

    A Parallel Algorithm for Inverse Halftoning and its Hardware by Siddiqi, Umair F.

    Published 2006
    “…Some degradation in image quality is noticed due to parallelization. The complete implementation of the method takes two CPLD devices with external content addressable memories (CAM) and static RAMs to store sLUTs.…”
    Get full text
    article
  4. 44
  5. 45

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP by Sait, Sadiq M.

    Published 2020
    “…The algorithm is based on the work presented in [10] in which a software implementation was proposed. …”
    Get full text
    article
  6. 46

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
  7. 47

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
    Get full text
    Get full text
    article
  8. 48
  9. 49
  10. 50
  11. 51

    A comparative study of RSA based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 52
  13. 53
  14. 54

    A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units by El-Amin, I.

    Published 2020
    “…The algorithm was developed, implemented and tested on an integrated model for the MS problem. …”
    Get full text
    article
  15. 55

    A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units by Duffuaa, S. O.

    Published 2020
    “…The algorithm was developed, implemented and tested on an integrated model for the MS problem. …”
    Get full text
    article
  16. 56
  17. 57
  18. 58
  19. 59

    A method for optimizing test bus assignment and sizing for system-on-a-chip by Harmanani, Haidar M.

    Published 2017
    “…Test access mechanism (TAM) is an important element of test access architectures for embedded cores and is responsible for on-chip test patterns transport from the source to the core under test to the sink. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 60

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
    Get full text
    Get full text
    Get full text
    masterThesis