Search Results - (( java implication based algorithm ) OR ( using communication technique algorithm ))
Search alternatives:
- communication technique »
- using communication »
- implication based »
- java implication »
-
1
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. …”
Get full text
Get full text
Thesis -
2
Bio-inspired fault tolerant network on chip
Published 2017“…The bio-inspired mechanisms of “synaptogenesis” and “sprouting” have been adopted in the proposed NoC algorithms and architecture. These techniques were implemented using the BE and GT services. …”
Get full text
Get full text
Article -
3
-
4
FPGA implementation of CPFSK modulation techniques for HF data communication
Published 2003Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…However, the need to use less complex and low-cost sensor de- vice results in constraints in computational power, communication bandwidth, and operational energy. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Embedded parallel distributed artificial intelligent processors for adaptive beam forming in WCDMA system
Published 2023“…Genetic algorithms (GAs) are powerful search techniques that are used successfully to solve problems in many different disciplines. …”
Conference paper -
8
-
9
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
Comparative study of some symmetric ciphers in mobile systems
Published 2014“…Some cryptanalysis techniques (e.g. Sandwich Cryptanalysis Technique, Sliding Property Technique, Differential Cryptanalysis Technique, and Biclique Cryptanalysis Technique) can be used to attack these symmetric ciphers, therefore there is a need for more analysis studies to address the security problems of these ciphers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Fuzzy based technique for microchip lead inspection using machine vision
Published 2008Get full text
Get full text
Proceeding Paper -
12
Performance evaluation of compression techniques on scientific dataset / Lam Wai Leong
Published 2006“…This template shall minimise any doubt and confusion of choosing and using a compression techniques. …”
Get full text
Get full text
Thesis -
13
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…Performance of the QPSO technique based on many heuristic algorithms it is comprised the following steps. …”
Get full text
Thesis -
14
-
15
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…Students are also excited about the algorithmic techniques and the scratch program generated. …”
Get full text
Get full text
Get full text
Article -
16
Lightweight authentication technique for secure communication of edge/fog data-centers
Published 2020“…It is also vulnerable to key escrow attack because the secret key used for encrypting and decrypting of the communicated messages is been created by the trusted cloud datacenter. …”
Get full text
Get full text
Article -
17
-
18
-
19
Non pilot and pilot aided least square channel estimation algorithm in MIMO-OFDM system / Nursarah Ainaa Abdul Halim
Published 2013“…Wireless communication is a developed technology and had been widely used nowadays, so the developments in digital communication are rapidly increasing to meet the ever increasing demand of higher data rates. …”
Get full text
Get full text
Thesis -
20
Biologically Inspired Network on Chip Fault Tolerant Algorithm Using Time Division Multiplexing
Published 2016“…Also, the accepted traffic (flit/cycle/node) of the proposed bio-inspired technique is better than traditional fault tolerant techniques by 68.45%.…”
Get full text
Get full text
Conference or Workshop Item
