Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer algorithms

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 61 - 64 of 64

Full-Text Articles in Engineering

An Effective Cube Comparison Method For Discrete Spectral Transformations Of Logic Functions, Ingo SchäFer May 1990

An Effective Cube Comparison Method For Discrete Spectral Transformations Of Logic Functions, Ingo SchäFer

Dissertations and Theses

Spectral methods have been used for many applications in digital logic design, digital signal processing and telecommunications. In digital logic design they are implemented for testing of logical networks, multiplexer-based logic synthesis, signal processing, image processing and pattern analysis. New developments of more efficient algorithms for spectral transformations (Rademacher-Walsh, Generalized Reed-Muller, Adding, Arithmetic, multiple-valued Walsh and multiple-valued Generalized Reed- Muller) their implementation and applications will be described.


Endless State-Of-Polarization Control For Coherent Optical Communication Systems Using Nematic Liquid Crystal, Scott H. Rumbaugh Dec 1989

Endless State-Of-Polarization Control For Coherent Optical Communication Systems Using Nematic Liquid Crystal, Scott H. Rumbaugh

Dissertations and Theses

One of the obstacles to coherent fiber-optic communications is the unpredictable polarization drift which necessitates the use of an active polarization controlling system to match the polarizations of the signal and local oscillator. The polarization match must be maintained during the reset of any of the finite range components to prevent loss of data. We present a novel and practical system which uses three liquid crystal devices for the polarization matching process. Also, the required reset control algorithm and its derivation are described in detail.


Rivest-Shamir-Adelman Cryptosystem, Edward A. Fetzner Apr 1985

Rivest-Shamir-Adelman Cryptosystem, Edward A. Fetzner

Theses & Honors Papers

Cryptography, the art of writing secret messages, has been practiced for almost 3000 years. Two people have a message to communicate to each other , with a chance of an outside person intercepting the message before it reaches the receiver . Therefore, the message must be put through an encryption scheme to keep the intervening person from finding the true nature of the message . An encryption scheme is coding a message using an enciphering key and then decoding the coded message with a deciphering key .


A Survey Of Simultaneous Binary Multiplication, Joseph Larry Voyer Jan 1972

A Survey Of Simultaneous Binary Multiplication, Joseph Larry Voyer

Retrospective Theses and Dissertations

No abstract provided.