61 |
A formal framework for modelling component extension and layers in distributed embedded systems /Förster, Stefan. January 2007 (has links)
Techn. Univ., Diss.--Chemnitz.
|
62 |
A formal fault model for component-based models of embedded systems /Fischer, Marco. January 2007 (has links)
Zugl.: @Chemnitz, Techn. Univ., Diss.
|
63 |
A Verilog 8051 soft core for FPGA applicationsRangoonwala, Sakina. Kougianos, Elias, January 2009 (has links)
Thesis (M.S.)--University of North Texas, August, 2009. / Title from title page display. Includes bibliographical references.
|
64 |
A mobile object container for dynamic component compositionYung, Chor-ho. January 2001 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2001. / Includes bibliographical references (leaves 111-113).
|
65 |
High-performance advanced encryption standard (AES) security co-processor designTandon, Prateek, January 2003 (has links) (PDF)
Thesis (Ph. D.)--School of Electrical and Computer Engineering, Georgia Institute of Technology, 2004. Directed by Hsien-Hsin S. Lee. / Includes bibliographical references (leaves 55-58).
|
66 |
MPSoC simulation and implementation of KPN applicationsCheung, Chun Shing. January 2009 (has links)
Thesis (Ph. D.)--University of California, Riverside, 2009. / Includes abstract. Title from first page of PDF file (viewed March 8, 2010). Available via ProQuest Digital Dissertations. Includes bibliographical references (p. 123-137). Also issued in print.
|
67 |
Design of real-time virtual resource architecture for large-scale embedded systemsFeng, Xiang 28 August 2008 (has links)
Not available / text
|
68 |
Compiler directed speculation for embedded clustered EPIC machinesPillai, Satish 28 August 2008 (has links)
Not available / text
|
69 |
A mobile object container for dynamic component composition翁楚灝, Yung, Chor-ho. January 2001 (has links)
published_or_final_version / Electrical and Electronic Engineering / Master / Master of Philosophy
|
70 |
An improved randomization of a multi-blocking jpeg based steganographic system.Dawoud, Peter Dawoud Shenouda. January 2010 (has links)
Steganography is classified as the art of hiding information. In a digital context, this refers to our ability to hide secret messages within innocent digital cover data. The digital domain offers many opportunities for possible cover mediums, such as cloud based hiding (saving secret information within the internet and its structure), image based hiding, video and audio based hiding, text based
documents as well as the potential of hiding within any set of compressed data. This dissertation focuses on the image based domain and investigates currently available image based steganographic techniques. After a review of the history of the field, and a detailed survey of currently available JPEG based steganographic systems, the thesis focuses on the systems currently
considered to be secure and introduces mechanisms that have been developed to detect them. The dissertation presents a newly developed system that is designed to counter act the current weakness in the YASS JPEG based steganographic system. By introducing two new levels of
randomization to the embedding process, the proposed system offers security benefits over YASS. The introduction of randomization to the B‐block sizes as well as the E‐block sizes used in the embedding process aids in increasing security and the potential for new, larger E‐block sizes also aids in providing an increased set of candidate coefficients to be used for embedding. The dissertation also introduces a new embedding scheme which focuses on hiding in medium frequency coefficients. By hiding in these medium frequency coefficients, we allow for more aggressive embedding without risking more visual distortion but trade this off with a risk of higher error rates due to compression losses. Finally, the dissertation presents simulation aimed at testing the proposed system performance compared to other JPEG based steganographic systems with similar embedding properties. We show that the new system achieves an embedding capacity of 1.6, which represents round a 7 times improvement over YASS. We also show that the new system, although introducing more bits in error per B‐block, successfully allows for the embedding of up to 2 bits per B‐block more than YASS at a similar error rate per B‐block. We conclude the results by demonstrating the new systems ability to resist detection both through human observation, via a survey, as well as resist computer aided analysis. / Thesis (M.Sc.)-University of KwaZulu-Natal, Durban, 2010.
|
Page generated in 0.0696 seconds