Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,951,224 papers from all fields of science
Search
Sign In
Create Free Account
24-bit
Known as:
24 bit
In computer architecture, 24-bit integers, memory addresses, or other data units are those that are at most 24 bits (3 octets) wide. Also, 24-bit CPU…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
35 relations
16-bit
26-bit
32-bit
8-bit
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Information Hiding with Data Diffusion using Convolutional Encoding for Super-encryption
J. Blackledge
,
P. Tobin
,
J. Myeza
,
Cid Mathew Adolfo
2017
Corpus ID: 56243622
The unification of data encryption with information hiding methods continues to receive significant attention because of the…
Expand
2016
2016
Two-channel high-accuracy Holoimage technique for three-dimensional data compression
Yajun Wang
,
Lianxin Zhang
,
Sheng Yang
,
Fang Ji
2016
Corpus ID: 63585176
2014
2014
A secure image steganography technique with moderately higher significant bit embedding
P. Gupta
,
Ratnakirti Roy
,
S. Changder
International Conference on Computational…
2014
Corpus ID: 18484484
Steganography is a process to hide secret data into a cover media in an imperceptible manner. In the spatial domain of image…
Expand
2014
2014
A digital thermometer with fast response and high precision
Guojing Wang
,
Weidong Wang
,
Kaiyuan Li
,
Hongyun Liu
International Conference on BioMedical…
2014
Corpus ID: 18782585
Body temperature is one of vital signs which can reflect physical status of an individual. Digital thermometers are adopted in…
Expand
2012
2012
Using Texture Analysis for Medical Diagnosis
R. Parekh
IEEE Multimedia
2012
Corpus ID: 27079513
An automated system for recognizing human skin disease conditions analyzes skin texture images using texture recognition…
Expand
Review
2012
Review
2012
SURVEY AND ANALYSIS OF VARIOUS STEGANOGRAPHIC TECHNIQUES
Ramanpreet Kaur
,
Prof. Baljit Singh
2012
Corpus ID: 2295917
Steganography is a method of secret communication that hides the existence of hidden message. The hidden message can be text…
Expand
2010
2010
Fixed and Floating-Point Implementations of Linear Adaptive Techniques for Predicting Physiological Hand Tremor in Microsurgery
B. W. Robinson
,
David Hernandez-Garduno
,
M. Saquib
IEEE Journal on Selected Topics in Signal…
2010
Corpus ID: 5648624
This paper presents the fixed and floating-point implementations for field-programmable gate arrays (FPGAs) of third-order hand…
Expand
2008
2008
Reducing the Number of Bits in the BTB to Attack the Branch Predictor Hot-Spot
N. Tomás
,
J. Sahuquillo
,
S. Petit
,
P. López
European Conference on Parallel Processing
2008
Corpus ID: 18781600
Current superscalar processors access the BTB early to anticipate the branch/jump target address. This access is frequent and…
Expand
2007
2007
A hybrid vision system for soccer robots using radial search lines
A. Neves
,
D. Martins
,
A. Pinho
2007
Corpus ID: 18553638
The recognition of colored objects is very im- portant for robot vision in RoboCup Middle Size League competition. This paper…
Expand
2002
2002
Data storage and retrieval for video-on-demand servers
P. Sumari
,
A. Samsudin
,
H. Kamarulhaili
Fourth International Symposium on Multimedia…
2002
Corpus ID: 30177265
Video on demand (VOD) is a system that provides a service to users to browse and watch videos within a computer network. One of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE