Search Results - (( developing e bit algorithm ) OR ( java implication drops algorithm ))
Search alternatives:
- implication drops »
- java implication »
- bit algorithm »
- developing e »
- e bit »
-
1
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022“…The results showed that this algorithm has better performance compared to other recently developed algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
-
3
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
4
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…To achieve certain level of security, Public Key Cryptography algorithm is performed on large integer that is more than 64-bit, typical bit size supported by conventional Central Processing Unit (CPU) (e.g. 512-bit for Elliptic Curve Cryptography (ECC), 2048-bit for Rivest-Shamir-Adleman (RSA) and million bits for Fully Homomorphic Encryption (FHE)). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
6
Testing static single cell faults using static and dynamic data background
Published 2011Get full text
Get full text
Conference or Workshop Item -
7
Proposed method for enhancing quantum bit error rate using quantum key distribution technique
Published 2014Get full text
Get full text
Conference or Workshop Item -
8
Comparative analysis of Selective Clonal Mutation with conventional GA operators in solar tracking environment
Published 2023Conference Paper -
9
Least Significant Bit (LSB) and Random Right Circular Shift (RRCF) in digital watermarking
Published 2016“…For simulation of our algorithm, we apply MA TLAB using Least Significant Bit (LSB) and Random Right Circular Shift (RRCF…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
Enhancement of Single and Composite Images Based on Contourlet Transform Approach
Published 2009“…Image enhancement is an imperative step in almost every image processing algorithms. Numerous image enhancement algorithms have been developed for gray scale images despite their absence in many applications lately. …”
Get full text
Get full text
Thesis -
12
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…One of the alternatives is by replacing it with cheaper adder and shifter to compute the same result. The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
Get full text
Get full text
Research Report -
13
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
Published 2023Conference paper -
14
Speech compression using compressive sensing on a multicore system
Published 2011“…In this paper, a novel algorithm for speech coding utilizing CS principle is developed. …”
Get full text
Get full text
Proceeding Paper -
15
-
16
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Published 2017“…The sentence selected for embedding watermarking bit are 85% higher in speed due to faster embedding watermarking bit string.The relation of information-hiding capacity is 1:5.5 which means that for every 5.5 terms of text, one bit of watermark can be hidden data. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Implementing case-based reasoning approach to framework documentation
Published 2023Conference paper -
19
Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm
Published 2009“…This method also enables us to design the controller to work as PDFLC, PIFLC or PIDFLC depending on two (one-bit) external signals with programmable fuzzy sets and programmable rule table using VHDL language for implementation on FPGA device, and to employ the new technique of fuzzy algorithm in order to serve a wide range of the physical systems which require a real-time operation. …”
Get full text
Get full text
Get full text
Article -
20
