Search Results - (( developing technology bit algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing technology »
- implication based »
- java implication »
- technology bit »
- bit algorithm »
-
1
VHDL implementation of DES algorithm / Emmanvel Kajan Mering
Published 2004Get full text
Get full text
Thesis -
2
A new 128-bit block cipher
Published 2009“…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
Get full text
Get full text
Thesis -
3
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…It provides several service categories including constant bit rate (CBR), variable bit rate (VBR), available bit rate (ABR), and unspecified bit rate (UBR) service. …”
Get full text
Get full text
Thesis -
4
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022“…The results showed that this algorithm has better performance compared to other recently developed algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
A Study And Development Of Digital Control Technique For Power Factor Correction Using Pre-Calculated Algorithm With A Low Cost 8-Bit Microcontroller
Published 2013“…A prototype of boost power factor correction controlled by an 8-bit microcontroller development board was set up to implement the proposed technique. …”
Get full text
Get full text
Thesis -
6
Instruction Set Extension Of A Low-End Reconfigurable Microcontroller In Bit-Sorting Implementation
Published 2018“…It was found that the ISA extension from 12-bit to 16-bit has produced a faster execution time with fewer resource utilization when implementing the bit-sorting algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Design of a floating point unit for 32-bit 5 stage pipeline processor
Published 2020Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
Enhanced scalar multiplication algorithm over prime field using elliptic net
Published 2024“…On 512 bits with similar comparison, the designed algorithm exhibited better performance by averages 59.2%, 31.0% and 13.2%. …”
Get full text
Get full text
Get full text
Article -
10
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…Images are encrypted using the least significant bit (LSB) steganography technique. The AES algorithm is the cryptographic technique used to lock or encrypt data. …”
Get full text
Get full text
Get full text
Article -
11
-
12
A block cipher based on genetic algorithm
Published 2016“…Other than that, the evolvement of technology will also contribute towards the development of new block ciphers. …”
Get full text
Get full text
Get full text
Thesis -
13
Watermarking technique based on ISB (Intermediate Significant Bit)
Published 2010Get full text
Get full text
Proceeding Paper -
14
AES S-box modification uses affine matrices exploration for increased S-box strength
Published 2025“…One algorithm developed to secure data is the Advanced Encryption Standard (AES). …”
Get full text
Get full text
Get full text
Article -
15
Application Specific Instruction Set Processor (ASIP) Design In An 8-Bit Softcore Microcontroller
Published 2018“…The overall ASIP design procedures used in this research provides flexibility for further development, either by extending its module to incorporate more complex algorithms or by upgrading current designs of its components.…”
Get full text
Get full text
Get full text
Article -
16
Booth’s Algorithm Design Using Field Programmable Gate Array
Published 2014Get full text
Get full text
Get full text
Article -
17
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
Published 2018“…In this paper, Least Significant Bit (LSB) algorithm has been proposed. This algorithm can help users to protect their confidential information during transmission by embedding the data inside the audio .wav file. …”
Get full text
Get full text
Get full text
Article -
18
-
19
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
20
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…One of the alternatives is by replacing it with cheaper adder and shifter to compute the same result. The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
Get full text
Get full text
Research Report
