Search Results - (( linear communication based algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    An Improved Linear Feedback Shift Register (LFSR- based) Stream Cipher Generator by Mahdi, Reyadh H

    Published 2009
    “…Linear feedback shift register ( LFSR-based) stream cipher an improved design for a random key generator in a stream cipher algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Embedded Ethernet System For Real-Time Communication by Thiagarajan, Durgesh

    Published 2018
    “…MATLAB, Simulink, and Stateflow are used for the Ethernet network model simulation. Based on the simulation, EIED backoff algorithm gave better performance in term of average delay compare to other algorithms. …”
    Get full text
    Get full text
    Monograph
  6. 6
  7. 7

    Comparison analysis of stream cipher algorithms for digital communication by Mat Sidek, Abd. Rahim, Sha'ameri, Ahmad Zuri

    Published 2007
    “…For bulk transmission of data, stream ciphers are ideal choices over block ciphers due to faster implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based on the linear feedback shift register (LFSR) with nonlinear combining function. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization by Pradyumna Kumar Mohapatra, Saroja Kumar Rout, Sukant Kishoro Bisoy, Sandeep Kautish, Muzaffar Hamzah, Muhammed Basheer Jasser, Ali Wagdy Mohamed

    Published 2022
    “…Here, in this work, to develop the symmetry-based efficient channel equalization in wireless communication, this paper proposes a modified form of bat algorithm trained with ANN for channel equalization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  10. 10
  11. 11

    Scalable rekeying algorithm in IEEE 802.16e by Sadeghi, Mohammad Mehdi Gilanian, Mohd Ali, Borhanuddin, Ma, Maode, Ab Manan, Jamalul-lail, Noordin, Nor Kamariah, Khatun, Sabira

    Published 2011
    “…This paper proposes a Scalable Rekeying Algorithm (SRA) based on a complete binary tree structure. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Scalable rekeying algorithm in IEEE 802.16e by Gilanian Sadeghi, Mohammad Mehdi, Borhanuddin, Mohd Ali, Ma, Maode, Jamalul-lail, Ab Manan, Nor Kamariah, Noordin, Sabira, Khatun

    Published 2011
    “…This paper proposes a Scalable Rekeying Algorithm (SRA) based on a complete binary tree structure. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    A Linear Prediction Based Estimation of Signal-to-Noise Ratio in AWGN Channel by Jeoti , Varun

    Published 2007
    “…The proposed estimator uses the characteristics of the second order moments of the additive white Gaussian noise digital communication channel and a linear predictor based on the modified-covariance algorithm in estimating the SNR value. …”
    Get full text
    Get full text
    Article
  16. 16

    A Linear Prediction Based Estimation of Signal-to-Noise Ratio in AWGN Channel by Nidal S., Kamel

    Published 2007
    “…The proposed estimator uses the characteristics of the second order moments of the additive white Gaussian noise digital communication channel and a linear predictor based on the modified-covariance algorithm in estimating the SNR value. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Implementation and integration of HF messaging system with cryptographic features by Mat Sidek, Abd. Rahim

    Published 2006
    “…The block cipher AES (Advanced Encryption Standard) is used for authentication and key distribution while the stream cipher that is based on the linear feedback shift register (LFSR) is used for confidentiality. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20