Search Results - (( variable _ bit algorithm ) OR ( java application optimized algorithm ))
Search alternatives:
- optimized algorithm »
- java application »
- bit algorithm »
-
1
Enhanced Flipping Technique to Reduce Variability in Image Steganography
Published 2023“…Benchmarking; Discrete cosine transforms; Genetic algorithms; Image coding; Image enhancement; Mean square error; Signal to noise ratio; Bayes method; Cover-image; Data hidden; Embedding capacity; Flipping methods; Least significant bits; Medium; Optimisations; Variability; Visual qualities; Steganography…”
Article -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
4
FPGA implementation of variable precision Euclid’s GCD algorithm
Published 2017“…Methodology: In this paper, we implement a fast GCD coprocessor based on Euclid's method with variable precisions (32-bit to 1024-bit). The proposed implementation was benchmarked using seven field programmable gate arrays (FPGA) chip families (i.e., one Altera chip and six Xilinx chips) and reported on four cost complexity factors: the maximum frequency, the total delay values, the hardware utilization and the total FPGA thermal power dissipation. …”
Get full text
Get full text
Get full text
Article -
5
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
6
-
7
Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission
Published 2011“…The aim of this thesis is to present a new shaped Variable Bit Rate (VBR) for video transmission, which plays a crucial role in delivering video traffic over the Internet. …”
Get full text
Get full text
Get full text
Thesis -
8
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
9
Variable Global Optimization min-sum (VGOMS) algorithm of decode-and forward-protocol for the relay node in the cooperative channel
Published 2020“…The proposed VGOMS algorithm apply the optimization scaling factor at the bit node processing of the variable node operation which have significantly less complexity as compared with the check node operation or both variable node and check node operation. …”
Get full text
Get full text
Get full text
Article -
10
An optimum drill bit selection technique using artificial neural networks and genetic algorithms to increase the rate of penetration
Published 2018“…In this method, offset well drilling records are used for training the ANN model and International Association Drilling Contractors (IADC) bit codes are used to name each bit. However, some researchers have used bit codes as input or output variables. …”
Get full text
Get full text
Article -
11
Variable Global Optimization min-sum (VGOMS) algorithm of decodeand-forward protocol for the relay node in the cooperative channel
Published 2019“…The proposed VGOMS algorithm apply the optimization scaling factor at the bit node processing of the variable node operation which have significantly less complexity as compared with the check node operation or both variable node and check node operation. …”
Get full text
Get full text
Get full text
Article -
12
Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm
Published 2008“…A number of experiments are implemented to design 3-bit, 4-bit, 5-bit and 6-bit circuits. The results show that the proposed method is able to produce the optimized circuit with lesser number of gates compared to the conventional methods. …”
Get full text
Get full text
Thesis -
13
A bit-serial sum of absolute difference accelerator for variable block size motion estimation of H.264
Published 2009“…In this paper, we propose the first least significant bit (LSB) bit-serial sum of absolute difference (SAD) hardware accelerator for integer variable block size motion estimation (VBSME) of H.264. …”
Get full text
Get full text
Conference or Workshop Item -
14
Security analysis of blowfish algorithm
Published 2013“…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. …”
Get full text
Get full text
Conference or Workshop Item -
15
Optimizing lossless compression by normalized data length in Huffman Algorithm
Published 2022“…It is also expected that this new algorithm scheme may potentially work well on data above 16-bit for future research.…”
Get full text
Get full text
Get full text
Thesis -
16
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
Published 2022“…For safe curves of 384 and 512 bits, the developed ENPM algorithm over prime field outperformed the BM algorithm in terms of overall multiplications with 57.60% and 59.16% average running time. …”
Get full text
Get full text
Get full text
Thesis -
17
Security analysis of blowfish algorithm
Published 2013“…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits.In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and correlation coefficient.In this paper we attempt to analyze the security of blowfish using avalanche criteria and correlation coefficient.We analyzed the randomness of the Blowfish output in an earlier paper titled “Randomness Analysis on Blowfish Block Cipher using ECB and CBC Modes”. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…It provides several service categories including constant bit rate (CBR), variable bit rate (VBR), available bit rate (ABR), and unspecified bit rate (UBR) service. …”
Get full text
Get full text
Thesis -
19
FPGA based Twofish Algorithm
Published 2009“…Twofish is one of the five finalists in AES contest. It is a 128-bit block cipher and can operate with variable key lengths of 128, 192 and 256 bits. …”
Get full text
Working Paper -
20
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph
