Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Implementation of speech encryption and decryption using advanced encryption standard
LP Kumar, AK Gupta - 2016 IEEE international conference on …, 2016 - ieeexplore.ieee.org
With the rapid increase in computing and communication devices the need for security
services has become crucial in information transfer. Protecting the digital information against …
services has become crucial in information transfer. Protecting the digital information against …
A frequency multiplier using three ambipolar graphene transistors
In this paper, a frequency doubler circuit is designed using three ambipolar graphene
transistors. Transistors are connected in series, across the voltage source (V DD) and the …
transistors. Transistors are connected in series, across the voltage source (V DD) and the …
An audio data encryption with single and double dimension discrete-time chaotic systems
—In this article, a study on increasing security of audio data encryption with single and
double dimension discrete-time chaotic systems was carried out and application and …
double dimension discrete-time chaotic systems was carried out and application and …
Application of advanced encryption standard on real time secured voice communication using FPGA
S Mondal, RK Sharma - 2019 10th International Conference on …, 2019 - ieeexplore.ieee.org
This paper proposes an application of AES on real time secured voice communication
system using FPGA (Field-Programmable Gate Array). The propose system consist of Micro …
system using FPGA (Field-Programmable Gate Array). The propose system consist of Micro …
Real-time, speech-in-speech hiding scheme based on least significant bit substitution and adaptive key
DM Ballesteros L, JM Moreno A - Computers and Electrical Engineering, 2013 - Elsevier
Real-time, embedded speech-in-speech hiding has not been widely researched.
Nevertheless, it could be useful, among other cases, in secure mobile telephony. In this …
Nevertheless, it could be useful, among other cases, in secure mobile telephony. In this …
Prediction interval with examples of similar pattern and prediction strength
In this paper, we formed prediction intervals using historical similarities, found through the
direct correlation. At first, a string of 5 to 20 recent samples is correlated with a long training …
direct correlation. At first, a string of 5 to 20 recent samples is correlated with a long training …
SRAM precharge system for reducing write power
This paper presents the static random access memory (SRAM) precharge system by using
an equaliser and a sense circuit. Recent goals of designing SRAM are to reduce area …
an equaliser and a sense circuit. Recent goals of designing SRAM are to reduce area …
[PDF][PDF] Audio encryption algorithm using hyperchaotic systems of different dimensions
Data security has become an important concern for communication through an insecure
channel because the information transferred across the networks has a large chance of …
channel because the information transferred across the networks has a large chance of …
[PDF][PDF] A study on the grain dependent current variation of polycrystalline organic transistors
HMD Kabir - 2016 - researchgate.net
I would like to thank my supervisor, Prof. Mansun Chan for providing me the opportunity to
research on such an interesting topic and to gather knowledge. Also, I would like to thank …
research on such an interesting topic and to gather knowledge. Also, I would like to thank …
Correlation based automatic volume control system for television/radio
Automatic volume control (AVC) changes volume of TV/Radio based on surroundings noise.
A number of hardware and software implementation of AVC is available. Conventional AVC …
A number of hardware and software implementation of AVC is available. Conventional AVC …