Search Results - (( code application based algorithm ) OR ( its application among algorithms ))*
Search alternatives:
- application based »
- application among »
- code application »
- among algorithms »
- its application »
-
1
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
-
4
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Cryptography is the science of hiding information and its applications include ATM cards, computer passwords and electronic commerce in this modern world. …”
Get full text
Get full text
Research Reports -
5
End-to-end DVB-S2X system design with deep learning-based channel estimation over satellite fading channels
Published 2021“…Although the conventional algorithm, MMSE, outperforms the pro�posed algorithms when the number of pilots increased but it is not applicable in real transmission as it is required prior knowledge about the channel statistic which is not the case with DL-based estimators which rely only on the pilots. …”
Get full text
Get full text
Thesis -
6
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…Visual Studio has been used in order to code the program in C#. In addition, some research has been made through observation as well as referring to the published materials and the existing application of fingerprint and Raspberry Pi. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
10
Development of a Wireless PC-Controlled Mobile Robot System and Multimedia Based Learning Module
Published 2001“…The ability to combine practical applications and visualization is among the advantages of technology based training and teaching. …”
Get full text
Get full text
Thesis -
11
Chain code algorithm in deriving T-Junction and region of a freehand sketch
Published 2004“…The algorithm is based on 8-connected 3x3 windows of Freeman chain code. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
Fast algorithm for VQ-based wavelet coding system
Published 2003Get full text
Get full text
Get full text
Proceeding Paper -
15
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
16
WAVELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS
Published 2007“…This project is about the implementation ofWavelet-DCT intra-frame coder for video coding applications. Wavelet-DCT is a novel algorithm that uses Forward Discrete Wavelet Transform (DWT) to compute DCT. …”
Get full text
Get full text
Final Year Project -
17
-
18
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
Get full text
Get full text
Thesis -
19
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
20
MicroRNA regulation of human choline kinase gene expression
Published 2019“…MicroRNAs (miRNAs) are a large family of non-coding RNAs that regulate gene expression. Dysregulation of miRNA expression is common in many types of cancer and miRNA profiling has the potential applications for cancer diagnostic and prognostic. …”
Get full text
Get full text
Article
