Search Results - (( java implication based algorithm ) OR ( encoder implementation new algorithm ))

Refine Results
  1. 1

    High-Speed Implementations Of Fractal Image Compression For Low And High Resolution Images by Saad, Abdul Malik Haider Yusef

    Published 2018
    “…Therefore, in this research new hardware implementations of FIC are proposed for accelerating the encoding process by means of parallelism and pipelining. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Labview based flow rate monitoring and measurement algorithm for rotary encoder by Garmabdari, Rasoul, Shafie, Suhaidi, Garmabdari, Alireza, Jaafar, Haslina, Aram, Aisa Khoushniat

    Published 2014
    “…For the purpose of control and supervision on natural water sources, the water consumption parameters such as instantaneous consumption, flow rate, and accumulated consumption should be measured and monitored. This paper presents a new monitoring algorithm implemented in Labview to monitor, calculate and plot the mentioned parameters based on the rotary encoders such as electromagnetic, ultrasonic, capacitive, or even hall-effect sensors based. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Partial Binary Tree Network (Pbtn): A New Dynamic Element Matching (Dem) Approach To Current Steering Digital Analog Converter (Dac) by Teh , Choon Yan

    Published 2014
    “…In this research, a new DEM algorithm is proposed on Current-Steering DACs with Partial Binary Tree Network (PBTN) algorithm to overcome glitches transitions with low complexity. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…The analysis revealed that performance of particle swarm optimization algorithm and Prey predator algorithm are better to use in training the networks. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem by Zaidan, A.A., Zaidan, B.B., Taqa, Y.A., Sami, M.K., Alam, G.M., Jalab, A.H.

    Published 2010
    “…The fourth concept is designing irregular encoding method base on LSB algorithm. The new way of encoding has approved the security of data hidden. …”
    Get full text
    Article
  6. 6

    A new parameterized architectural design for SENSE reconstruction by Siddiqui, M.F., Reza, A.W., Kanesan, J., Omer, H.

    Published 2014
    “…This research proposes a new parameterized architecture design for Sensitivity Encoding (SENSE) reconstruction. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Enhancing selective encryption for H.264/AVC using advanced encryption standard by Abomhara, Mohamed, Zakaria, Omar, Khalifa, Othman Omran, Zaidan, Aos Alaa, Zaidan, Bilal Bahaa

    Published 2010
    “…The system includes two main functions; first is the encoding/encryption of video stream, through the execution of two processes (the input sequences of video is first compressed by the H.264/AVC encoder, and the encoded bit stream (I-frame) is partially encrypted using AES block cipher). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Reconstructing applicable chaotic Baptista-type symmetric cryptosystem by Daud, Muhamad Azlan

    Published 2014
    “…As a result, we studied the idea of Huffman encoding. We then designed a new compression algorithm developed using ideas from the Huffman coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A New Method Of Speed Sensorless Control For Permanent Magnet Synchronous Motor by Samat, Ahmad Asri Abd

    Published 2019
    “…A simulation using MATLAB/Simulink software is conducted to investigate the feasibility of the proposed algorithm. DSpace is deployed for algorithm implementation. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…Due to the promising prospect ofchaotic encryption in the field ofcryptography, and the lack ofimplementation ofthis new encryption-decryption algorithm, this project focuses on introducing a new symmetric encryption-decryption scheme based on a chaos system for VoIP.…”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12
  13. 13

    Development of low power viterbi decoder on complex programmable logic device platform by Abu, Mohd Azlan

    Published 2018
    “…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Gripping controller design for a one-degree-of-freedom robotic hand model based on slip detection by Al-Shanoon, Abdulrahman Abdulkareem Sattoori

    Published 2016
    “…The robotic hand system comprises a new algorithm for data extraction and signal processing analysis that are measured from an object re-gripping operation based on slip detection information. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An FPGA implementation of Alamouti's transmit diversity technique by Mukilan, Pushpamalar

    Published 2008
    “…Alamouti’s transmit diversity scheme is a space-time block code with support for two transmit antennas and an arbitrary number of receive antennas. The implementation demonstrates this space-time code in a baseband system with two transmit and just one antenna at the receiver with the encoding and decoding algorithms using Verilog Hardware Description Language (HDL), which is modeled to establish an end-to-end link over real wireless channels to form a complete multiple antenna wireless communications system.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Modified multi-prime RSA using discriminant of a quadratic and Chinese remainder theorem / Nur Fatimah Kabulanto and Farah Aina Abdul Razak by Kabulanto, Nur Fatimah, Abdul Razak, Farah Aina

    Published 2018
    “…In order to achieving security from unwanted users, the message will encode to make it unreadable format. RSA Cryptosystem is generally utilized in the popular implementation of public key Cryptosystem. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19

    Improved personalised data modelling using parameter independent fuzzy weighted k-nearest neighbour for spatio/spectro-temporal data by Abdullah, Mohd Hafizul Afifi

    Published 2021
    “…Therefore, a data modelling mechanism which implements PIfwkNN classifier algorithm for improving the overall classification accuracy of the NeuCube architecture has been proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20