Search Results - (( java _ implementation algorithm ) OR ( coding scheme based algorithm ))

Search alternatives:

Refine Results
  1. 1

    Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology by Lee, Feng Wei

    Published 2022
    “…After understanding the codebased hard problems, we construct a code-based signature scheme and a codebased ring signature scheme. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Adaptive Modulation and Coding Using Signal to Noise Ratio Switching Threshold by Jasman, Faezah

    Published 2009
    “…In this thesis, three types of subband adaptive transmission scheme namely adaptive modulation (AM), adaptive coding (AC) and adaptive modulation and coding (AMC) based on SNR switching threshold are investigated. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Block based low complexity iterative QR precoder structure for Massive MIMO by Mok, Li Suet

    Published 2021
    “…We have investigated two performance characteristics, system sum rate and computational complexity using various linear pre-coding schemes, including the proposed one. For the complexity, the simulation results show that the proposed BD pre-coding solution reduced complexity up to 90% compared to the other schemes. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Improved Distributed Wyner-Ziv Video Coding Based On Reed Solomon Error Correction Scheme And Frame Estimation For Wireless Transmission by Chiam, Kin Honn

    Published 2015
    “…As the RS codes involve less complicated encoding and decoding algorithm, the overall system time is reduced and the output is obtained in a shorter time. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…Finally, the performance of V-BLAST/STBC transceiver scheme with proposed LC-QR algorithm is compared with other MIMO systems, such as V-BLAST and orthogonal space-time block codes. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Energy-driven scheduling for Digital Video Broadcasting - Satellite Second Generation (DVB-S2) by Thian, Laah Lean, Al-Saegh, Ali Mohammed, Ramli, K. F., Ibrahim, N. S., Sali, Aduwati, Salman, Mustafa Ismael

    Published 2013
    “…The EEF is compared with Round Robin (RR) algorithm, and a gain in energy efficiency of 47% is obtained when different modulation schemes with common code rate are implemented. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Efficient mobile video transmission based on a joint coding scheme by Azni, Mohamed, Boudjadja, Rima, Dahmani, Abdelnasser, Zennir, Mohamed Nadjib

    Published 2017
    “…The purpose of this work is on one hand to minimize the Packet Loss Rate (PLR) and, on the other hand to maximize the visual quality of video transmitted over a wireless network (WN).The scheme proposed is founded on a FEC adaptable with the semantics of the H.264/AVC video encoding.This mechanism relies upon a rate distortion algorithm, controlling the channel code rates under the global rate constraints given by the WN.Based on a data partitioning (DP) tool, both packet type and packet length are taken into account by the proposed optimization mechanism which leads to unequal error protection (UEP). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Optimizing lossless compression by normalized data length in Huffman Algorithm by Tonny, Hidayat

    Published 2022
    “…This research produces a new scheme called Quaternary Arity (4-ary) Modification Quadtree (MQ) or 4-ary/MQ based on entropy coding which has its roots in other variants of Huffman schemes such as Binary / Static, Quadtree, Octatree, and Hexatree. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Multiple description coding for streoscopic 3D by Karim, H., Sali, Aduwati, Worral, S., Sadka, A. H., Kondoz, A. M.

    Published 2009
    “…The proposed algorithm enhances the error resilience of the 3D video using the combination of even and odd frame based MDC while retaining good temporal prediction efficiency for video over error-prone networks. …”
    Get full text
    Get full text
    Article
  14. 14

    An Adaptive Error Correction Scheme For Synchronous Digital Hierarchy-Based Wavelength Division Multiplexed Optical Network by Cheah, Cheng Lai

    Published 2007
    “…The scheme supports adaptive codes because it uses a dedicated WDM channel for transmission of different sizes of FEC redundancy for the payloads. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A Scheme For Space-Time-Frequency Coding And Adaptive Multiple Antenna Selection For Improving The Performance Of Multiple-Input Single-Output Ofdm System by Noordin, Nor Kamariah

    Published 2006
    “…Findings show that the proposed scheme outperforms other multiple antenna schemes such as the one based on the mean of the channel impulse response, especially at higher order modulation. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  18. 18

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis