Search Results - (( developing a bit algorithm ) OR ( java application sensor algorithm ))
Search alternatives:
- application sensor »
- java application »
- sensor algorithm »
- bit algorithm »
- a bit »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
VHDL implementation of DES algorithm / Emmanvel Kajan Mering
Published 2004Get full text
Get full text
Thesis -
3
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…Thirdly, the design and implementation issues have been addressed together with the major drawbacks of the previous schemes and hence two algorithms have been proposed. A dynamic rate-based flow control (DRFC) scheme has been developed to support ABR service in unicast environment, while an adaptive feedback consolidation (AFC) algorithm has been designed for ABR multicasting. …”
Get full text
Get full text
Thesis -
4
Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm
Published 2008“…A number of experiments are implemented to design 3-bit, 4-bit, 5-bit and 6-bit circuits. …”
Get full text
Get full text
Thesis -
5
A new 128-bit block cipher
Published 2009“…Towards that and after reviewing related research, in this research we propose to come up with a new 128-bit block cipher cryptographic algorithm which shall meet the security requirements. …”
Get full text
Get full text
Thesis -
6
16 bits x 16 bits booth multiplier using VHDL
Published 2008“…The designed digital system will receive two 16 bits input and processes it to create a 32 bits output with the value of the multiplied inputs data value. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…To achieve certain level of security, Public Key Cryptography algorithm is performed on large integer that is more than 64-bit, typical bit size supported by conventional Central Processing Unit (CPU) (e.g. 512-bit for Elliptic Curve Cryptography (ECC), 2048-bit for Rivest-Shamir-Adleman (RSA) and million bits for Fully Homomorphic Encryption (FHE)). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
A Study And Development Of Digital Control Technique For Power Factor Correction Using Pre-Calculated Algorithm With A Low Cost 8-Bit Microcontroller
Published 2013“…The mature manufacturing technologies in digital devices has led to the proliferation of powerful yet low cost digital controllers and enable the possibility of digital power factor correction implementation in a more competitive way. A digital control technique for power factor correction using pre-calculated algorithm with a low cost 8-bit microcontroller is studied and presented in this paper. …”
Get full text
Get full text
Thesis -
9
Instruction Set Extension Of A Low-End Reconfigurable Microcontroller In Bit-Sorting Implementation
Published 2018“…Extensive simulations were performed with the and a comprehensive methodology is proposed. It was found that the ISA extension from 12-bit to 16-bit has produced a faster execution time with fewer resource utilization when implementing the bit-sorting algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Design of a floating point unit for 32-bit 5 stage pipeline processor
Published 2020“…Also, a dedicated register file is developed for FPU to store 32-bits or 64- bits of data. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm
Published 2010“…In this study, we developed a novel method that is able to shift the limit for transparent data hiding in audio from the fourth LSB layer to the eighth LSB layer, thus the method has improved the capacity and robustness of data hiding in the audio file using a two steps approach. …”
Get full text
Get full text
Get full text
Article -
12
Steganography based on utilizing more surrounding pixels
Published 2010“…The purpose of this study is to investigate the application of least significant bit insertion method (LSB) in concealing a definite amount of message bits inside a typical media such as an 8-bit gray-scale image and develop an alternative model structure selection algorithm based on considering more surrounding pixels in order to compute the best capacity value for each target pixel. …”
Get full text
Get full text
Thesis -
13
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022“…The results showed that this algorithm has better performance compared to other recently developed algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
A block cipher based on genetic algorithm
Published 2016“…The structure of the components has a fixed block size which is 128 bits and a key size of 128 bits. …”
Get full text
Get full text
Get full text
Thesis -
15
Resource allocation technique for powerline network using a modified shuffled frog-leaping algorithm
Published 2018“…The main goal of this work is to develop a conceptual framework and mathematical model for resource allocation using Shuffled Frog-Leap Algorithm (SFLA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations
Published 2009“…This research proposes the use of cyclic shift and bit wise XOR operation as new approach to replace the lookup table. …”
Get full text
Get full text
Article -
17
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…Our research presents a method for this study, which involves hiding digital images with color at a depth of 24 bits. …”
Get full text
Get full text
Get full text
Article -
18
Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode.
Published 2016“…A Bloom Filter pattern matching algorithm with fast hashing functions is developed for 32-bit and 64-bit computer system. …”
Get full text
Get full text
Thesis -
19
Watermarking technique based on ISB (Intermediate Significant Bit)
Published 2010“…It essentially involves embedding the watermark by replacing the least significant bit of the image data with a bit of the watermark data. …”
Get full text
Get full text
Proceeding Paper -
20
Testing static single cell faults using static and dynamic data background
Published 2011Get full text
Get full text
Conference or Workshop Item
