Search Results - (( rule expansion function algorithm ) OR ( using codification using algorithm ))
Search alternatives:
- function algorithm »
- using codification »
- codification using »
- using algorithm »
- rule expansion »
-
1
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…The study shows that 23 of the rules are cryptographically strong where eight of them are used in our hash function design. …”
Get full text
Get full text
Thesis -
2
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
3
Implementation and simplification of an Output Shifted Coding Modulation (OSCM) on a high speed DSP processor / Roslina Mohamad, Wan Nor Syafizan Wan Muhamad and Rosmalini Abdul Ka...
Published 2009“…It is capable of reducing the bandwidth expansion by using Tr/4-shift DQPSK. This is achieved through fine tuning the set of rules for the mapping of coded bits and also with modifying error detection and correction techniques in trellis diagram. …”
Get full text
Get full text
Research Reports -
4
Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani
Published 2015“…In case of multiple filterbanks the cepstral features are used in different experts for performing classification based on different representation of speeches. …”
Get full text
Get full text
Thesis
