Search Results - (( rule expansion function algorithm ) OR ( using codification using algorithm ))

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    A collision resistant cryptographic hash function based on cellular automata rules by Jamil, Norziana

    Published 2013
    “…The study shows that 23 of the rules are cryptographically strong where eight of them are used in our hash function design. …”
    Get full text
    Get full text
    Thesis
  2. 2

    The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach by Ab. Malik, Rosely, Jamil S., Mohamed

    Published 2001
    “…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
    Get full text
    Get full text
    Article
  3. 3

    Implementation and simplification of an Output Shifted Coding Modulation (OSCM) on a high speed DSP processor / Roslina Mohamad, Wan Nor Syafizan Wan Muhamad and Rosmalini Abdul Ka... by Mohamad, Roslina, Wan Muhamad, Wan Nor Syafizan, Abdul Kadir, Rosmalini

    Published 2009
    “…It is capable of reducing the bandwidth expansion by using Tr/4-shift DQPSK. This is achieved through fine tuning the set of rules for the mapping of coded bits and also with modifying error detection and correction techniques in trellis diagram. …”
    Get full text
    Get full text
    Research Reports
  4. 4

    Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani by Mirhassani, Seyedmostafa

    Published 2015
    “…In case of multiple filterbanks the cepstral features are used in different experts for performing classification based on different representation of speeches. …”
    Get full text
    Get full text
    Thesis