Search Results - (( code application among algorithm ) OR ( its application a algorithms ))*
Search alternatives:
- application among »
- code application »
- among algorithm »
- its application »
- application a »
- a algorithms »
-
1
-
2
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
3
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Cryptography is the science of hiding information and its applications include ATM cards, computer passwords and electronic commerce in this modern world. …”
Get full text
Get full text
Research Reports -
5
-
6
-
7
-
8
Numerical solution for Duffing-Van Der Pol Oscillator via block method
Published 2021“…The Duffing-Van Der Pol Oscillators is an interesting differential problem with many applications in mechanics and fluid dynamics. Among its most known application involves the chaotic motions in periodic-self excited oscillators and occasionally used to model hydrodynamic forces on canonical structures. …”
Get full text
Get full text
Article -
9
Numerical Solution For Duffing-van Der Pol Oscillator Via Block Method
Published 2024journal::journal article -
10
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…Visual Studio has been used in order to code the program in C#. In addition, some research has been made through observation as well as referring to the published materials and the existing application of fingerprint and Raspberry Pi. …”
Get full text
Get full text
Thesis -
11
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004Get full text
Get full text
Final Year Project -
12
End-to-end DVB-S2X system design with deep learning-based channel estimation over satellite fading channels
Published 2021“…Although the conventional algorithm, MMSE, outperforms the pro�posed algorithms when the number of pilots increased but it is not applicable in real transmission as it is required prior knowledge about the channel statistic which is not the case with DL-based estimators which rely only on the pilots. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
-
16
-
17
-
18
The impact of Xiaohongshu as the primary information hub: a case study among utar undergraduates
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
-
20
Development of a Wireless PC-Controlled Mobile Robot System and Multimedia Based Learning Module
Published 2001“…The ability to combine practical applications and visualization is among the advantages of technology based training and teaching. …”
Get full text
Get full text
Thesis
