Search Results - (( code application among algorithm ) OR ( _ application means algorithm ))*
Search alternatives:
- application among »
- application means »
- code application »
- among algorithm »
- means algorithm »
-
1
-
2
-
3
End-to-end DVB-S2X system design with deep learning-based channel estimation over satellite fading channels
Published 2021“…Although the conventional algorithm, MMSE, outperforms the pro�posed algorithms when the number of pilots increased but it is not applicable in real transmission as it is required prior knowledge about the channel statistic which is not the case with DL-based estimators which rely only on the pilots. …”
Get full text
Get full text
Thesis -
4
Optimal geometric arrangement of unfinned and finned flat tube heat exchangers under laminar forced convection
Published 2014“…The algorithm of semi-implicit method for pressure-linked equations was utilized to link the pressure fields with velocity. …”
Get full text
Get full text
Thesis -
5
-
6
Crypt Edge Detection Using PSO,Label Matrix And BI-Cubic Interpolation For Better Iris Recognition(PSOLB)
Published 2017“…Iris identification is an automatic system to recognise an individual in biometric applications.Human iris is an internal organ that can be accessed from external view of the body.Moreover,the structure of the iris is formed in a complete random manner and has unique features such as crypts,furrows,collarets,pupil,freckles, and blotches.In fact, no iris patterns are the same.The iris structure is stable which it means the location of the iris features is permanent at certain point.Nevertheless,the shape of iris features changes slowly due to several factors which include aging,surgery,growth,emotion and dietary habits. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. …”
Get full text
Get full text
Thesis -
9
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
10
-
11
A Comparison Study of LDPC and BCH Codes
Published 2006Get full text
Get full text
Final Year Project -
12
-
13
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
14
Computational simulation for static and dynamic load of rectangular plate in elastic region for analysis of impact resilient structure.
Published 2012“…Further simulations are carried out using commercial codes for some sample applications to explore impact resilient structural characteristics in the elastic region.…”
Get full text
Get full text
Conference or Workshop Item -
15
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
16
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Handheld devices 3D video streaming compression algorithm / Mohamad Taib Miskon, Hamidah Jantan and Wan Ahmad Khusairi Wan Chek
Published 2016“…In recent years, a Three Dimensional Discrete Cosine Transform (3D-DCT) coding algorithm has been developed for compression of still 3D integral images [8-10], The main benefit of using transform coding is that integral 3D images are inherently divided into small non-overlapping…”
Get full text
Get full text
Research Reports -
18
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
Get full text
Get full text
Thesis -
19
-
20
