Search Results - (( rule expansion function algorithm ) OR ( java application force algorithm ))

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    A collision resistant cryptographic hash function based on cellular automata rules by Jamil, Norziana

    Published 2013
    “…The study shows that 23 of the rules are cryptographically strong where eight of them are used in our hash function design. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  3. 3

    Implementation and simplification of an Output Shifted Coding Modulation (OSCM) on a high speed DSP processor / Roslina Mohamad, Wan Nor Syafizan Wan Muhamad and Rosmalini Abdul Ka... by Mohamad, Roslina, Wan Muhamad, Wan Nor Syafizan, Abdul Kadir, Rosmalini

    Published 2009
    “…It is capable of reducing the bandwidth expansion by using Tr/4-shift DQPSK. This is achieved through fine tuning the set of rules for the mapping of coded bits and also with modifying error detection and correction techniques in trellis diagram. …”
    Get full text
    Get full text
    Research Reports
  4. 4

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis