نتایج جستجو برای: gezel
تعداد نتایج: 15 فیلتر نتایج به سال:
1. Abolfazl A.G., Sis N.M., Doust-Nobar R.S., Ebrahimnezhad Y., Ghorbani A., 2020. Estimating nutritional value of wheat and barley grains by in vitro gas production technique using rumen faeces liquor Gezel rams. J. Anim. Environment. 12, 45–52, https://doi.org/10.22034/aej.2... CrossRef Google Scholar
This paper presents an efficient software implementation of the Montgomery modular multiplication algorithm on a multi-core system. A prototype of general multi-core systems is designed with GEZEL. We propose a new instruction scheduling method for multi-core systems that can reduce the number of data transfers between different cores. Compared to the implementations on a single-core system, th...
Security processors are used to implement cryptographic algorithms with high throughput and/ or low energy consumption constraints. The design of these processors is a balancing act between flexibility and energy consumption. The target is to create a processor with just enough programmability to cover a set of algorithms—an application domain. This paper proposes GEZEL, a design environment co...
The Samukh region has favorable soil and climatic conditions for growing valuable crops is one of the regions producing a large number grapes. For first time in region, mechanical composition technical grape varieties was studied: Bayanshir, Gara Serme, Gezel Gara, Khemesher, Shirvanshakhi, Tavkveri, Terbash, Madrasa, Rkatsiteli, Shemakhi marandisi. Among studied varieties, yield index Bayanshi...
in order to study the genetic diversity of grapevine in mahneshan (zanjan) an experiment was performed during 2012 and 2013. in different phenological growth stages (bud burst, anthesis and fruit ripening) quantitative and qualitative characteristics of 12 genotypes (marageh, shahani, khalili, ag-ozom, germez keshmish, ag-keshmish, gara-keshmish, asghari, pert-pert, gezel-ozom and gandomeh) bas...
Implementing public-key cryptography on platforms with limited resources, such as microprocessors, is a challenging task. Hardware/software co-design is often the only answer to implement the computationally intensive operations with limited memory and power at an acceptable speed. This contribution describes such a solution for Hyperelliptic Curve Cryptography (HECC). The proposed hardware/sof...
Implementing large word-length public key algorithms on small 8-bit μ-controllers is a challenge. This paper presents a hardware/software co-design solution of RSA and Elliptic Curve Cryptography (ECC) over GF(p) on a 12 MHz 8-bit 8051 μ-controller. The hardware coprocessor has a modular arithmetic logic unit (MALU) of which the digit size (d) is variable. It can be adapted to the speed and ban...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید