Search Results - (( rule expansion function algorithm ) OR ( java application force algorithm ))
Search alternatives:
- function algorithm »
- application force »
- java application »
- force algorithm »
- rule expansion »
-
1
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…The study shows that 23 of the rules are cryptographically strong where eight of them are used in our hash function design. …”
Get full text
Get full text
Thesis -
2
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
3
Implementation and simplification of an Output Shifted Coding Modulation (OSCM) on a high speed DSP processor / Roslina Mohamad, Wan Nor Syafizan Wan Muhamad and Rosmalini Abdul Ka...
Published 2009“…It is capable of reducing the bandwidth expansion by using Tr/4-shift DQPSK. This is achieved through fine tuning the set of rules for the mapping of coded bits and also with modifying error detection and correction techniques in trellis diagram. …”
Get full text
Get full text
Research Reports -
4
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis
