Search Results - (( java implication based algorithm ) OR ( encoder implementation phase algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…The thesis gains information on the time required to encode the biometric image by implementing techniques of CPM and BPBM and measures their impact on the encoding duration. …”
    Get full text
    Get full text
    Thesis
  2. 2

    DSP BASED IMPLEMENTATION OF FIELD ORIENTED CONTROL OF THREE-PHASE INDUCTION MOTOR DRIVES by Sulaiman, Marizan, Patakor, Fizatul Aini, Ibrahim, Zulkifilie

    Published 2013
    “…The objective of this paper is to presents a practical implementation of field oriented control of three-phase induction motor based on Space Vector Pulse Width Modulation technique using Digital Signal Processing (DSP) board TMS320F2812. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…This study is divided into several phases including preliminary study, experimental design, algorithm enhancement and result analysis. …”
    Get full text
    Get full text
    Thesis
  4. 4

    The design of viterbi decoder for low power consumption space time trellis code without adder architecture using RTL model by Abu, Mohd Azlan, Harun, Harlisya, Harmin, Mohammad Yazdi, Abdul Wahab, Noor Izzri, Abdul Kadir, Muhd Khairulzaman

    Published 2016
    “…Findings – The results showed that the STTC decoder can successfully decipher the encoded symbols from the STTC encoder and can fully recover the original data. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Doctor-patient remote consultation system with secure medical images by Teh, Yee Heng

    Published 2022
    “…The outcome was that we can encrypt the X-ray image and the people with decryption key only can view the image. In the experiment phase, 3 of the selected algorithms was implemented as similar language as possible to produce more reliable result. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Generation and statistical analysis of chaos-based pseudorandom sequences by Hina, Aliyu Danladi

    Published 2019
    “….), thereby, suggesting its ability to be implemented in a cryptographic algorithm. The pro- posed generator has been analyzed in two phases with the first phase subjected to correlation (fast) attack and the second phase by convolutional encoder based correlation attack. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Indirect Rotor Field Oriented Control of Induction Motor With Rotor Time Constant Estimation by Moh'd Radwan, Eyad Moh'd

    Published 2004
    “…A simple yet effective rotor time constant identification method is presented and used for updating the slip calculator used by the IRFOC algorithms. A complete simulation model of an induction motor and IRFOC scheme is presented and tested using SIMULINWMATLAB, and experimentally implemented on a DSP Board (MCK243j without any need for voltage phase sensors. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Three-Description Scalar And Lattice Vector Quantization Techniques For Efficient Data Transmission by Teo, Hui Ting

    Published 2015
    “…As this thesis suggests a new labeling algorithm that uses lattice 4 for three description MDC system. …”
    Get full text
    Get full text
    Thesis