Search alternatives:
generation algorithm » genetic algorithm (Expand Search), detection algorithm (Expand Search), encryption algorithm (Expand Search)
code generation » power generation (Expand Search), force generation (Expand Search), bone regeneration (Expand Search)
generation algorithm » genetic algorithm (Expand Search), detection algorithm (Expand Search), encryption algorithm (Expand Search)
code generation » power generation (Expand Search), force generation (Expand Search), bone regeneration (Expand Search)
-
161
(HSCRC) Scheme-1 encoding.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
162
Comparative graph depicting power consumption.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
163
Design methodology followed for the hardware.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
164
Block diagram for 10-bit input.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
165
Comparative graph depicting worst case delay.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
166
Comparative results with state of art design.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
167
Data showing reduction in power usage.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
168
Data showing change in worst case delay.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
169
Comparative graph depicting area used.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
170
Complete layout of the proposed architecture.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
171
GR encoding example for M = 4 [2].
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
172
Data showing number of bits used.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
173
Comparative graph depicting bit usage.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
174
JAG2025-cloud-top-properties
Published 2025“…<br><br>LUT2010.txt, LUT2012.txt, LUT2014.txt are used to form the total LUT. And they are generated using the code "BuildBUT.py"<br><br>BuildBUT.py is the code used for generating the LUT. …”
-
175
BABAPPA GUI: A Codeml-Centered Positive Selection Analysis Software
Published 2025“…</li><li>Use Inno Setup Compiler with <code>babappa_installer.iss</code> for Windows installer generation.…”
-
176
CSPP instance
Published 2025“…<p dir="ltr">This Python script (<code>instance_generator.py</code>) is a tool designed to <b>programmatically generate synthetic instance data for container stowage and logistics problems.…”
-
177
DMP4P: Tailoring Daily Meal Plans to Personalized Nutrient Requirements for Chronic Disease Prevention
Published 2025“…The complete database archived on Figshare (DOI:10.6084/m9.figshare.30153778), with generating code on GitHub, an interactive website, and APIs provided for broad access.…”
-
178
Single neurons in the human substantia nigra encode social learning signals
Published 2025“…Lastly, use the regression scripts to relate continuous firing rates to behavioral variables and also to generate relevant visualizations. All figures in the paper were generated using the code provided in these scripts. …”
-
179
Synthetic dataset of 100 fundus auto fluorescence of inherited retinal disease
Published 2025“…Each folder contains 100 synthetic Fundus Auto Fluorescence images generated by the SynthEye algorithm (<a href="https://www.ophthalmologyscience.org/article/S2666-9145(22)00147-6/fulltext" rel="nofollow" target="_blank">https://www.ophthalmologyscience.org/article/S2666-9145(22)00147-6/fulltext</a>).…”
-
180
Hydrangea
Published 2025“…Here we use the abbreviations: ST refer to fail-stops, IC refer to incorrectness, SL refer to slower execution, UI refer to unfriendly user interface, TK refer to more tokens, and IS refer to insecure.</li><li><b>source-code locations</b>: The location of the code file where the defect occurs.…”