Search Results - (( java implication based algorithm ) OR ( using communication technique algorithm ))

Refine Results
  1. 1

    A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata by Mohamad Hata, Mohsen

    Published 2019
    “…Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Bio-inspired fault tolerant network on chip by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…The bio-inspired mechanisms of “synaptogenesis” and “sprouting” have been adopted in the proposed NoC algorithms and architecture. These techniques were implemented using the BE and GT services. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…However, the need to use less complex and low-cost sensor de- vice results in constraints in computational power, communication bandwidth, and operational energy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Embedded parallel distributed artificial intelligent processors for adaptive beam forming in WCDMA system by Krishnan P.S., Kiong T.S., Koh J., Yap D.

    Published 2023
    “…Genetic algorithms (GAs) are powerful search techniques that are used successfully to solve problems in many different disciplines. …”
    Conference paper
  8. 8
  9. 9
  10. 10

    Comparative study of some symmetric ciphers in mobile systems by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2014
    “…Some cryptanalysis techniques (e.g. Sandwich Cryptanalysis Technique, Sliding Property Technique, Differential Cryptanalysis Technique, and Biclique Cryptanalysis Technique) can be used to attack these symmetric ciphers, therefore there is a need for more analysis studies to address the security problems of these ciphers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12

    Performance evaluation of compression techniques on scientific dataset / Lam Wai Leong by Lam , Wai Leong

    Published 2006
    “…This template shall minimise any doubt and confusion of choosing and using a compression techniques. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing by Elrasheed Ismail, Sultan

    Published 2013
    “…Performance of the QPSO technique based on many heuristic algorithms it is comprised the following steps. …”
    Get full text
    Thesis
  14. 14
  15. 15

    Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language by Jano, Zanariah, Omar, Norliza, Nazir, Faridah

    Published 2019
    “…Students are also excited about the algorithmic techniques and the scratch program generated. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Lightweight authentication technique for secure communication of edge/fog data-centers by Yahuza, Muktar, Idris, Mohd Yamani Idna, Wahab, Ainuddin Wahid Abdul, Garba, Adamu Abdullahi, Musa, Mahadi A.

    Published 2020
    “…It is also vulnerable to key escrow attack because the secret key used for encrypting and decrypting of the communicated messages is been created by the trusted cloud datacenter. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Non pilot and pilot aided least square channel estimation algorithm in MIMO-OFDM system / Nursarah Ainaa Abdul Halim by Abdul Halim, Nursarah Ainaa

    Published 2013
    “…Wireless communication is a developed technology and had been widely used nowadays, so the developments in digital communication are rapidly increasing to meet the ever increasing demand of higher data rates. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Biologically Inspired Network on Chip Fault Tolerant Algorithm Using Time Division Multiplexing by Sethi, Muhammad Athar Javed, Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…Also, the accepted traffic (flit/cycle/node) of the proposed bio-inspired technique is better than traditional fault tolerant techniques by 68.45%.…”
    Get full text
    Get full text
    Conference or Workshop Item