21   Artículos

 
en línea
Yunfeng Hu, Bin Tang, Chaoyi Chen, Lexing Hu, Qingming Huang, Jiaqi Cai, Jinbo Xie, Bin Li and Zhaohui Wu    
In recent years, due to the rise of the Internet of Things (IoT), various sensors have come to be in great demand for IoT devices. Analog-to-digital converters (ADCs) act as an important part of receivers in sensors. To improve the uptime of IoT devices,... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jeong-Geun Kim and Kang-Hee Lee    
In this paper, a 4-bit digital step attenuator using 0.25 µm GaN HEMT technology for wideband radar systems is presented. A switched-path attenuator topology with resistive T-type attenuators and double-pole double-throw (DPDT) switches was used to achie... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mengdi Zhang, Ye Zhao, Zhengsheng Han and Fazhan Zhao    
This paper presents a 19 ps precision and 170 M samples/s time-to-digital converter (TDC) in FPGA. Through the direct count method and tapped delay line method, the coarse count and fine count can be extracted, respectively. The direct count is realized ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Chih-Hsuan Lin and Kuei-Ann Wen    
With nine-axis sensing systems in 5G smartphones, mobile power consumption has become increasingly important, and ultra-low-power (ULP) sensor circuits can decrease power consumption to tens of microwatts. This paper presents an innovative successive app... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
Amine Khaldi     Pág. 143 - 149
In this work, we present a classification of steganographic methods applicable to digital images. We also propose a classification of steganographic methods according to the type of image used. We noticed there are no methods that can be applied to all i... ver más
Revista: International Annals of Science    Formato: Electrónico

 
en línea
Abbas Ali Hussein,Osama Qasim Jumah Al-Thahab     Pág. 43 - 55
Protecting information on various communication media is considered an essential requirement in the present information transmission technology. So, there is a continuous search around different modern techniques that may be used to protect the data from... ver más
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

 
en línea
Muhammad Khoiruddin Harahap,Nurul Khairina     Pág. 151 - 158

 
en línea
Piotr Artiemjew and Aleksandra Kislak-Malinowska    
Our concern in this paper is to explore the possibility of using rough inclusions for image steganography. We present our initial research using indiscernibility relation as a steganographic key for hiding information into the stego carrier by means of a... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Eka Yulia Sari,Ahmad Rifki Harir,Dony Ariyus    
Saat ini Indonesia memasuki industri 4.0, dimana apapun berhubungan dengan teknologi. Pertukaran data dan informasi secara digital lebih efektif dan efisien sehingga memudahkan penggunanya. Tentunya data dan informasi ada yang dapat diakses publik dan ad... ver más

 
en línea
Muhaimin Hasanudin,Deni Kuswoyo,Boy Yuliadi     Pág. 153 - 160
This study uses the technique of incognito data and information into a container in the form of images combined with the addition of the password by using the method of Least Significant Bit (LSB) and the method of Haar Wavelet. Testing the system by sen... ver más
Revista: Aceh International Journal of Science and Technology    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »