Sciweavers

1499 search results - page 26 / 300
» Case Study: An Implementation of a Secure Steganographic Sys...
Sort
View
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
14 years 6 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
HICSS
2003
IEEE
104views Biometrics» more  HICSS 2003»
15 years 2 months ago
Development of the Information Systems Implementation Research Method
Through the use of a recently developed taxonomy of information systems implementation, a new research method is developed. The Information Systems Implementation Research Method ...
Kai R. T. Larsen
RSP
2008
IEEE
182views Control Systems» more  RSP 2008»
15 years 3 months ago
From Application to ASIP-based FPGA Prototype: a Case Study on Turbo Decoding
ASIP-based implementations constitute a key trend in SoC design enabling optimal tradeoffs between performance and flexibility. This paper details a case study of an ASIP-based im...
Olivier Muller, Amer Baghdadi, Michel Jéz&e...
EUSFLAT
2007
468views Fuzzy Logic» more  EUSFLAT 2007»
14 years 11 months ago
Soft Computing Robot Navigation Case Study
This contribution presents Soft Computing Robot Navigation for mobile robot SCORCAS, a Case Study. The Navigation uses fuzzy logic experienced on mobile robot systems. Fuzzy logic...
Dimitar Vassilev Lakov, Margarita Raykova Saraliev...
PTS
2010
132views Hardware» more  PTS 2010»
14 years 8 months ago
Increasing Functional Coverage by Inductive Testing: A Case Study
This paper addresses the challenge of generating test sets that achieve functional coverage, in the absence of a complete specification. The inductive testing technique works by p...
Neil Walkinshaw, Kirill Bogdanov, John Derrick, Ja...