QSCILLOSCOPE: A PC-Based Real Time Oscilloscope
The scenery of this paper is to design a PC-based Real Time Oscilloscope, called "Qscilloscope". Qscilloscope is capable to connect a computer with a small device via universal serial bus (USB) port for voltage signal waveform display and alteration. It detects maximum +20V to minimum -20V...
| Main Authors: | Yiqi, Tew, Bok-Min, Goi |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2964/ |
Similar Items
QSCILLOSCOPE: A PC-Based Real Time Oscilloscope
by: Yiqi, Tew, et al.
Published: (2008)
by: Yiqi, Tew, et al.
Published: (2008)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
On An Improved Parallel Construction Of Suffix Arrays For Low Bandwidth Pc-Cluster.
by: Kok, Jun Lee, et al.
Published: (2003)
by: Kok, Jun Lee, et al.
Published: (2003)
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
by: Phan, Raphael C.-W., et al.
Published: (2008)
by: Phan, Raphael C.-W., et al.
Published: (2008)
A fragile watermarking scheme protecting originator's rights for multimedia service
by: Ting, Grace C. -W., et al.
Published: (2007)
by: Ting, Grace C. -W., et al.
Published: (2007)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
A Real Time Visual Monitoring Module For Traffic Conditions Based On A Modified Auto-Associative Memory
by: Kareem, Emad Issa Abdul
Published: (2012)
by: Kareem, Emad Issa Abdul
Published: (2012)
Development of a real time expert system for 11KV distribution automation
by: Uddin,, Md. Safi, et al.
Published: (2006)
by: Uddin,, Md. Safi, et al.
Published: (2006)
Real time actions and gestures as intuitive user interface for creative 3D modeling
by: Looi, N.K., et al.
Published: (2005)
by: Looi, N.K., et al.
Published: (2005)
MaTRU: A new NTRU-based cryptosystem
by: Coglianese, , M, et al.
Published: (2005)
by: Coglianese, , M, et al.
Published: (2005)
Security mediated certificateless signatures
by: Yap, Nvun-She, et al.
Published: (2007)
by: Yap, Nvun-She, et al.
Published: (2007)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Optimizing The MPLS Support For Real Time IPv6-Flows Using MPLS-PHS Approach.
by: Tat, Chee Wan, et al.
Published: (2009)
by: Tat, Chee Wan, et al.
Published: (2009)
An optimized framework for header suppression of real time IPV6 traffic in multiprotocol label switching (MPLS) networks.
by: Mohammed, Imad Jasim
Published: (2011)
by: Mohammed, Imad Jasim
Published: (2011)
An efficient and provable secure identity-based identification scheme in the standard model
by: Ji-Jian, Chin, et al.
Published: (2008)
by: Ji-Jian, Chin, et al.
Published: (2008)
Adaptive model simplification in real-time rendering for visualization
by: Ng, K. -W., et al.
Published: (2007)
by: Ng, K. -W., et al.
Published: (2007)
Real-time facial expression recognitions: A review
by: Adeshina, Adekunle Micheal, et al.
Published: (2009)
by: Adeshina, Adekunle Micheal, et al.
Published: (2009)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the security bounds of CMC, EME, EME(+) and EME* - Modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Smart home microcontroller: Telephone interfacing
by: Leong, , CS, et al.
Published: (2006)
by: Leong, , CS, et al.
Published: (2006)
Real-time image quality assessment with mixed Lagrange time delay estimation autoregressive (MLTDEAR) model
by: SIM, K. S., et al.
Published: (2007)
by: SIM, K. S., et al.
Published: (2007)
Real-time image dynamic range compensation for an optical imaging system
by: Sim, K. S., et al.
Published: (2007)
by: Sim, K. S., et al.
Published: (2007)
Mixed lagrange time delay estimation autoregressive Wiener filter application for real-time SEM image enhancement
by: Sim, K.S., et al.
Published: (2007)
by: Sim, K.S., et al.
Published: (2007)
A real-time hybrid correlator for synthetic aperture radar signal processing
by: Koo, V. C., et al.
Published: (2007)
by: Koo, V. C., et al.
Published: (2007)
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Cryptanalysis of PASS II and MiniPass
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
A modified-set partitioning in hierarchical trees algorithm for real-time image compression
by: Akter, M., et al.
Published: (2008)
by: Akter, M., et al.
Published: (2008)
Layered Botnet Detection Framework Based On Signal
Processing And Discrete Time Analysis
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
Attacks on a robust watermarking scheme based on self-reference image
by: TING, G, et al.
Published: (2008)
by: TING, G, et al.
Published: (2008)
New hybrid genetic operators for real coded genetic algorithm to compute optimal control of a class of hybrid systems
by: ARUMUGAM, M, et al.
Published: (2005)
by: ARUMUGAM, M, et al.
Published: (2005)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
A Markovian inventory system with random shelf time and back orders
by: CHAKRAVARTHY, S, et al.
Published: (2004)
by: CHAKRAVARTHY, S, et al.
Published: (2004)
Minimizing The Garbage Collection Time In Flash Memory Using Efficient Data Allocation Scheme.
by: Rahiman, Amir Rizaan
Published: (2009)
by: Rahiman, Amir Rizaan
Published: (2009)
Eml-Mac: A Simplified Time Slot Synchronization Algorithm For
Wireless Sensor Networks
by: Yazdi, Ehsan Tabatabaei
Published: (2010)
by: Yazdi, Ehsan Tabatabaei
Published: (2010)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
A Comparison Between Inter-Asterisk eXchange
Protocol and Jingle Protocol: Session Time
by: Haj Aliwi, H. S., et al.
Published: (2016)
by: Haj Aliwi, H. S., et al.
Published: (2016)
Similar Items
-
QSCILLOSCOPE: A PC-Based Real Time Oscilloscope
by: Yiqi, Tew, et al.
Published: (2008) -
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006) -
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006) -
On An Improved Parallel Construction Of Suffix Arrays For Low Bandwidth Pc-Cluster.
by: Kok, Jun Lee, et al.
Published: (2003) -
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)