Search Results - (( java implementation rsa algorithm ) OR ( ((coding same) OR (coding scheme)) based algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    A NOVEL CONSTRUCTION OF VECTOR COMBINATORIAL (VC) CODE FAMILIES AND DETECTION SCHEME FOR SAC OCDMA SYSTEMS by AHMED MOHMED, HASSAN YOUSIF

    Published 2010
    “…The simulation results indicate that VC code has a superior performance compared to other reported codes for the same transmission quality. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Deterministic phase sequence approach for peak to average power ratio reduction in orthogonal frequency division multiplexing systems by Kazemian, Mohsen

    Published 2016
    “…The first proposed method, called Gray Code-based Phase sequence (GCP) is a new low complexity PAPR reduction scheme based on a Gray code structure and a similarity measurement block; included on two steps: firstly, selecting the phase sequences based on Gray codes and finally, evaluating the similarity between the input and the output of the Power Amplifier (PA), among the selected phase sequences in the previous step. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An FPGA implementation of Alamouti's transmit diversity technique by Mukilan, Pushpamalar

    Published 2008
    “…Alamouti’s transmit diversity scheme is a space-time block code with support for two transmit antennas and an arbitrary number of receive antennas. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…Because of these self-features, the fractal image coding method is a more dependable alternative to choose in image coding schemes. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A region-based Principal Component Analysis (PCA) technique for medical image compression by Lim, Sin Ting

    Published 2022
    “…The research has successfully developed an improved region-based compression scheme for medical images where lossy and lossless compression is implemented in one PCA architecture. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Protection of the texts using Base64 and MD5 by Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi

    Published 2012
    “…This paper discusses an encryption method using base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology by Lee, Feng Wei

    Published 2022
    “…After understanding the codebased hard problems, we construct a code-based signature scheme and a codebased ring signature scheme. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Adaptive Modulation and Coding Using Signal to Noise Ratio Switching Threshold by Jasman, Faezah

    Published 2009
    “…In this thesis, three types of subband adaptive transmission scheme namely adaptive modulation (AM), adaptive coding (AC) and adaptive modulation and coding (AMC) based on SNR switching threshold are investigated. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Block based low complexity iterative QR precoder structure for Massive MIMO by Mok, Li Suet

    Published 2021
    “…We have investigated two performance characteristics, system sum rate and computational complexity using various linear pre-coding schemes, including the proposed one. For the complexity, the simulation results show that the proposed BD pre-coding solution reduced complexity up to 90% compared to the other schemes. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Improved Distributed Wyner-Ziv Video Coding Based On Reed Solomon Error Correction Scheme And Frame Estimation For Wireless Transmission by Chiam, Kin Honn

    Published 2015
    “…As the RS codes involve less complicated encoding and decoding algorithm, the overall system time is reduced and the output is obtained in a shorter time. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…Finally, the performance of V-BLAST/STBC transceiver scheme with proposed LC-QR algorithm is compared with other MIMO systems, such as V-BLAST and orthogonal space-time block codes. …”
    Get full text
    Get full text
    Thesis