Search Results - (( programming based bit algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- programming based »
- java application »
- bit algorithm »
- based bit »
-
1
Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm
Published 2008“…GALI is programmed by the success chromosome bits obtained from the simulation phase. …”
Get full text
Get full text
Thesis -
2
-
3
Parallelization of speech compression based algorithm based on human auditory system on multicore system
Published 2012“…To achieve a scalable parallel speech coding algorithm, single program multiple data (SPMD) programming model was used, in which a single program was written for all cores. …”
Get full text
Get full text
Get full text
Article -
4
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013Get full text
Get full text
Student Project -
5
-
6
Design and implementation of real data fast fourier transform processor on field programmable gates array
Published 2015“…The radix-4 FFT algorithm will be implemented for 64 and 256 points using both 8-bit and 16-bit input width. …”
Get full text
Get full text
Thesis -
7
Hardware Acceleration of Window Big-Digit (Wbd) Multiplication for Embedded Applications
Published 2015“…The accelerator is equipped with AXI interface and integrated into an ARM-based SoC system for benchmarking purpose. The test programs are The hardware-accelerated 256-bits multiplication is found that to be 340 fold faster than pure software implementation of classical multiplication. …”
Get full text
Get full text
Thesis -
8
Implementing case-based reasoning approach to framework documentation
Published 2023Subjects: “…Bits…”
Conference paper -
9
Speech compression using compressive sensing on a multicore system
Published 2011“…The performance of overall algorithms will be evaluated based on the processing time and speech quality. …”
Get full text
Get full text
Proceeding Paper -
10
Secure radio telemetry and data acquisition using wireless data communication system with portable UHF transceivers / Mohd Dani Baba and Deepak Kumar Ghodgaonkar
Published 2003“…The data collected at RTS site are encrypted prior to transmission to the BTS by employing the One Time Pad (OTP) and Caesar Cipher algorithms. These algorithms are chosen because they are suitable for low bit rate data. …”
Get full text
Get full text
Research Reports -
11
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
12
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
13
Digital Signal Processor (DSP) Design Using Very Long Instruction Word (VLIW) Architecture
Published 2001“…This flexibility of changing the data width or bit values is suitable in VLIW architecture approach. …”
Get full text
Get full text
Thesis -
14
Early dengue diagnosis based on fuzzy logic / Shahrul Razhi Che Ros
Published 2017Get full text
Get full text
Thesis -
15
Analysis of image steganography using AES / Nur Amira Muhamad Ghazali
Published 2020“…In this project, we combine the method of cryptography and steganography using Advanced Encryption Standard (AES) and Least Significant Bits (LSB) algorithms. At first, the plaintext was encrypted to cipher text and hidden in the image. …”
Get full text
Get full text
Thesis -
16
Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes
Published 2018“…In home automation system based on IoT, user-requested operations may have malfunction problems when bits error gets generated due to heavy noise in the fading channel. …”
Get full text
Get full text
Monograph -
17
Video traffic analysis on Unifi broadband network / Laina Sofia Mahamad
Published 2017“…Thirdly, to identify best traffic model based on fitted model in developing network traffic bandwidth control algorithms. …”
Get full text
Get full text
Thesis -
18
-
19
Asynchronous point to point FSK- FM radio telemetry system with data encryption for monitoring environmental conditions / Shuhaimi Shamsuddin
Published 2003“…A software programming based on LabVIEW was developed for data processing and presentation. …”
Get full text
Get full text
Thesis -
20
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis
