Hellenic Open University

Displaying 1-7 of 7 results

  • White Papers // Sep 2012

    FPGA-Based Design Approaches of Keccak Hash Function

    Keccak hash function has been submitted to SHA-3 competition and it belongs to the final five candidate functions. In this paper FPGA implementations of Keccak function are presented. The designs were coded using HDL language and for the hardware implementation, a XILINX Virtex-5 FPGA was used. Some of the proposed...

    Provided By Hellenic Open University

  • White Papers // Aug 2012

    VLSI Design and Implementation of Homophonic Security System

    In this paper, the authors consider a security system, with unconditionally encipher procedure. Such a system enciphering the input data in such way, that they do not finally contain enough information that can be under statistical analysis, in order to break the cipher. The attempt of cryptanalysis is not affected...

    Provided By Hellenic Open University

  • White Papers // May 2012

    Architectural Optimizations & Hardware Implementations of WLANs Encryption Standard

    Office State Commercial Cryptography Administrator (OSCCA) in China has specified SMS4 block cipher, as the encryption standard of wireless local area networks. This work, introduces architectural optimizations for this standard, regarding performance, allocated resources, and covered area for the efficient hardware implementation of it. Furthermore, the hardware integrations of the...

    Provided By Hellenic Open University

  • White Papers // Sep 2010

    Capital Structure of SMEs: To What Extent Does Size Matter?

    The subject of the capital structure decision of firms has been thoroughly studied both theoretically and empirically. This paper adds to the existing literature by examining a number of hypotheses relating to the capital structure decision in relation to the firms' size, namely by distinguishing among micro, small and medium...

    Provided By Hellenic Open University

  • White Papers // May 2010

    Placement of Entities in Object-Oriented Systems by Means of a Single-Objective Genetic Algorithm

    Behavior and state allocation in object-oriented systems is a rather non-trivial task that is hard to master and automate since it is guided by conceptual criteria and therefore relies on human expertise. Since attributes and methods can be placed in the classes of a system in uncountable different ways, the...

    Provided By Hellenic Open University

  • White Papers // Nov 2009

    Examples as Interaction: On Humans Teaching a Computer to Play a Game

    This paper reviews an experiment in human-computer interaction, where interaction takes place when humans attempt to teach a computer to play a strategy board game. The authors show that while individually learned models can be shown to improve the playing performance of the computer, their straightforward composition results in diluting...

    Provided By Hellenic Open University

  • White Papers // Mar 2009

    A Prototype for Educational Planning Using Course Constraints to Simulate Student Populations

    Distance learning universities usually afford their students the flexibility to advance their studies at their own pace. This can lead to a considerable fluctuation of student populations within a program's courses, possibly affecting the academic viability of a program as well as the related required resources. Providing a method that...

    Provided By Hellenic Open University

  • White Papers // Mar 2009

    A Prototype for Educational Planning Using Course Constraints to Simulate Student Populations

    Distance learning universities usually afford their students the flexibility to advance their studies at their own pace. This can lead to a considerable fluctuation of student populations within a program's courses, possibly affecting the academic viability of a program as well as the related required resources. Providing a method that...

    Provided By Hellenic Open University

  • White Papers // Nov 2009

    Examples as Interaction: On Humans Teaching a Computer to Play a Game

    This paper reviews an experiment in human-computer interaction, where interaction takes place when humans attempt to teach a computer to play a strategy board game. The authors show that while individually learned models can be shown to improve the playing performance of the computer, their straightforward composition results in diluting...

    Provided By Hellenic Open University

  • White Papers // May 2010

    Placement of Entities in Object-Oriented Systems by Means of a Single-Objective Genetic Algorithm

    Behavior and state allocation in object-oriented systems is a rather non-trivial task that is hard to master and automate since it is guided by conceptual criteria and therefore relies on human expertise. Since attributes and methods can be placed in the classes of a system in uncountable different ways, the...

    Provided By Hellenic Open University

  • White Papers // Sep 2010

    Capital Structure of SMEs: To What Extent Does Size Matter?

    The subject of the capital structure decision of firms has been thoroughly studied both theoretically and empirically. This paper adds to the existing literature by examining a number of hypotheses relating to the capital structure decision in relation to the firms' size, namely by distinguishing among micro, small and medium...

    Provided By Hellenic Open University

  • White Papers // May 2012

    Architectural Optimizations & Hardware Implementations of WLANs Encryption Standard

    Office State Commercial Cryptography Administrator (OSCCA) in China has specified SMS4 block cipher, as the encryption standard of wireless local area networks. This work, introduces architectural optimizations for this standard, regarding performance, allocated resources, and covered area for the efficient hardware implementation of it. Furthermore, the hardware integrations of the...

    Provided By Hellenic Open University

  • White Papers // Aug 2012

    VLSI Design and Implementation of Homophonic Security System

    In this paper, the authors consider a security system, with unconditionally encipher procedure. Such a system enciphering the input data in such way, that they do not finally contain enough information that can be under statistical analysis, in order to break the cipher. The attempt of cryptanalysis is not affected...

    Provided By Hellenic Open University

  • White Papers // Sep 2012

    FPGA-Based Design Approaches of Keccak Hash Function

    Keccak hash function has been submitted to SHA-3 competition and it belongs to the final five candidate functions. In this paper FPGA implementations of Keccak function are presented. The designs were coded using HDL language and for the hardware implementation, a XILINX Virtex-5 FPGA was used. Some of the proposed...

    Provided By Hellenic Open University