-
15661
Some New Methods of Music Synthesis
Published 2023“…It capable of synthesizing 14 square wave voices, each voice having a range of 7 octaves, with each octave having 12 bits of frequency control. Its purpose it to allow the user to record key depression times, key release times and key impact velocities when playing a keyboard piece. …”
Get full text
-
15662
-
15663
Players with Bounded Randomness Capabilities
Published 2024“…I show that the additional cost that the agents have to incur due to being unable to share random bits is bounded by O(min(m_c(G),n)), where m_c(G) is the mincut size of G. …”
Get full text
Thesis -
15664
Yeast-laden Hydrogel Capsules for Scalable Trace Lead Removal from Water
Published 2024Get full text
Article -
15665
-
15666
Subtle, intimate interfaces for mobile human computer interaction
Published 2007Get full text
Thesis -
15667
Comparator design and analysis for comparator-based switched-capacitor circuits
Published 2007Get full text
Thesis -
15668
Rateless and rateless unequal error protection codes for Gaussian channels
Published 2008Get full text
Thesis -
15669
-
15670
-
15671
-
15672
-
15673
-
15674
The quality of change : growth of a whitewater resort in North Carolina
Published 2013Get full text
Thesis -
15675
-
15676
-
15677
Of malicious motes and suspicious sensors
Published 2015“…Two key conclusions of this study: (1) all the problems considered feature semantic vulnerabilities that allow an adversary to disrupt termination more efficiently than simple jamming (i.e., all have a jamming gain greater than 1); and (2) for all the problems considered, the round complexity grows linearly with the number of bits to be communicated (i.e., all have a Ω(lg|V|) or Ω(lgn) disruption-free complexity.)…”
Get full text
Article -
15678
-
15679
Prediction-compensated polyphase multiple description image coding with adaptive redundancy control
Published 2013“…For the quantity issue, the amount of redundancy bits allocated to each description is determined according to the network condition; for that, the probability of channel failure is incorporated into mathematical formulation on the derivation of optimal redundancy allocation condition. …”
Get full text
Get full text
Journal Article -
15680
Breaking the hardware implementation of AES encryption
Published 2021“…Advanced Encryption Standard (AES) is an extensively used symmetric block cipher algorithm which generates ciphertext based on plaintext and key (128, 192, or 256 bits) inputs. Recover the cipher key through brute-force attempts is unrealistic due to the extremely high computation complexity. …”
Get full text
Final Year Project (FYP)