Search Results - (( linear communication based algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- linear communication »
- communication based »
- application testing »
- testing algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
-
3
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
4
An Improved Linear Feedback Shift Register (LFSR- based) Stream Cipher Generator
Published 2009“…Linear feedback shift register ( LFSR-based) stream cipher an improved design for a random key generator in a stream cipher algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
Embedded Ethernet System For Real-Time Communication
Published 2018“…MATLAB, Simulink, and Stateflow are used for the Ethernet network model simulation. Based on the simulation, EIED backoff algorithm gave better performance in term of average delay compare to other algorithms. …”
Get full text
Get full text
Monograph -
6
Performance study of direction of arrival (DOA) estimation algorithms for linear array antenna
Published 2009Get full text
Get full text
Proceeding Paper -
7
Comparison analysis of stream cipher algorithms for digital communication
Published 2007“…For bulk transmission of data, stream ciphers are ideal choices over block ciphers due to faster implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based on the linear feedback shift register (LFSR) with nonlinear combining function. …”
Get full text
Get full text
Get full text
Article -
8
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…Here, in this work, to develop the symmetry-based efficient channel equalization in wireless communication, this paper proposes a modified form of bat algorithm trained with ANN for channel equalization. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
10
-
11
Scalable rekeying algorithm in IEEE 802.16e
Published 2011“…This paper proposes a Scalable Rekeying Algorithm (SRA) based on a complete binary tree structure. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Scalable rekeying algorithm in IEEE 802.16e
Published 2011“…This paper proposes a Scalable Rekeying Algorithm (SRA) based on a complete binary tree structure. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
A Linear Prediction Based Estimation of Signal-to-Noise Ratio in AWGN Channel
Published 2007“…The proposed estimator uses the characteristics of the second order moments of the additive white Gaussian noise digital communication channel and a linear predictor based on the modified-covariance algorithm in estimating the SNR value. …”
Get full text
Get full text
Article -
16
A Linear Prediction Based Estimation of Signal-to-Noise Ratio in AWGN Channel
Published 2007“…The proposed estimator uses the characteristics of the second order moments of the additive white Gaussian noise digital communication channel and a linear predictor based on the modified-covariance algorithm in estimating the SNR value. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…The block cipher AES (Advanced Encryption Standard) is used for authentication and key distribution while the stream cipher that is based on the linear feedback shift register (LFSR) is used for confidentiality. …”
Get full text
Get full text
Get full text
Thesis -
19
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
20
