Search Results - (( java _ implementation algorithm ) OR ( coding scheme using algorithm ))
Search alternatives:
- implementation algorithm »
- using algorithm »
- coding scheme »
-
1
Adaptive Modulation and Coding Using Signal to Noise Ratio Switching Threshold
Published 2009“…To solve this problem adaptive coding schemes which provides another area of flexibility is investigated. …”
Get full text
Get full text
Thesis -
2
The evolution and trend of chain code scheme
Published 2008Get full text
Get full text
Get full text
Article -
3
Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology
Published 2022“…After understanding the codebased hard problems, we construct a code-based signature scheme and a codebased ring signature scheme. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
6
Block based low complexity iterative QR precoder structure for Massive MIMO
Published 2021“…We have investigated two performance characteristics, system sum rate and computational complexity using various linear pre-coding schemes, including the proposed one. …”
Get full text
Get full text
Thesis -
7
Chain code algorithm in deriving T-Junction and region of a freehand sketch
Published 2004“…Chain code scheme is one of the Picture Description Languages used to represent lines. …”
Get full text
Get full text
Get full text
Article -
8
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…Finally, the performance of V-BLAST/STBC transceiver scheme with proposed LC-QR algorithm is compared with other MIMO systems, such as V-BLAST and orthogonal space-time block codes. …”
Get full text
Get full text
Thesis -
9
Energy-driven scheduling for Digital Video Broadcasting - Satellite Second Generation (DVB-S2)
Published 2013“…Furthermore, EEF outperforms RR by 264% concerning the useful transmitted bits when QPSK modulation scheme with different coding rates is used.…”
Get full text
Get full text
Conference or Workshop Item -
10
Fast algorithm for VQ-based wavelet coding system
Published 2003“…In this paper, a modified version of (Linde-Buzo-Gray)LBG algorithm using Partial Search Partial Distortion (PSPD) is presented for coding the wavelet coefficients. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Network coding schemes with efficient LDPC coded MIMO–NOMA in two-way relay networks
Published 2020“…LDPC decoding is done using the sum-product algorithm (SPA), which has two types of decoding methods, hard-decision and soft-decision. …”
Get full text
Get full text
Article -
12
Improved undetected error probability model for JTEC and JTEC-SQED coding schemes
Published 2013“…This paper presents an improved mathematical model to estimate the undetected error probability of these two joint coding schemes. According to the decoding algorithm the errors are classified into patterns and their decoding result is checked for failures. …”
Get full text
Get full text
Conference or Workshop Item -
13
Network coding schemes with efficient LDPC coded MIMO–NOMA in two-way relay networks
Published 2020“…LDPC decoding is done using the sum-product algorithm (SPA), which has two types of decoding methods, hard-decision and soft-decision. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
15
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
16
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
17
Multiple description coding for streoscopic 3D
Published 2009“…Simulation results show improved performance using the proposed MDC at high error rates compared to the single description coding (SDC) and the original even and odd frame MDC.…”
Get full text
Get full text
Article -
18
Development of new code for optical code division multiple access systems
Published 2011“…Splitting algorithm is proposed to construct the new code families namely RD code. …”
Get full text
Thesis -
19
-
20
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis
