Search Results - (( linear communication system algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- linear communication »
- application testing »
- testing algorithm »
- system algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…It is shown via simulation that the combined RLS adaptive algorithm with the linear MMSE multiuser detector provides the best overall performance. …”
Get full text
Get full text
Thesis -
3
Performance evaluation of direction of arrival (DOA) for linear array antenna design using multiple signal classification (MUSIC) algorithm in variation of displacement vectors and...
Published 2007“…The use of adaptive antenna arrays is one area that gives promise for improving capacity of wireless communication systems and provides improved safety through location capabilities. …”
Get full text
Get full text
Thesis -
4
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
5
Embedded Ethernet System For Real-Time Communication
Published 2018Get full text
Get full text
Monograph -
6
Performance study of direction of arrival (DOA) estimation algorithms for linear array antenna
Published 2009Get full text
Get full text
Proceeding Paper -
7
Comparison analysis of stream cipher algorithms for digital communication
Published 2007“…The stream cipher algorithms evaluated are based on the linear feedback shift register (LFSR) with nonlinear combining function. …”
Get full text
Get full text
Get full text
Article -
8
Adaptive beamforming with 16 element linear array using MaxSIR and MMSE algorithms
Published 2007Get full text
Get full text
Get full text
Proceeding Paper -
9
Cryptographic Algorithm Using Matrix Inversion as Data Protection
Published 2011Get full text
Get full text
Get full text
Article -
10
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
11
Analyzing communication overhead in linearizing peer to peer system
Published 2016“…In this paper, we present the analysis of overhead of number of messages passed during the construction process of a self-stabilizing linearizing algorithm. This overhead really give some impact on the network, especially in the simulation environment where resources are physically shared by logical nodes.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Scalable rekeying algorithm in IEEE 802.16e
Published 2011“…SRA is introduced with linear linked list structure in order to make the system more scalable. …”
Get full text
Get full text
Conference or Workshop Item -
13
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…The transmission of high-speed data over communication channels is the function of digital communication systems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…The sign function has been implemented in the process of filter coefficients adjustments in order to get faster adaptation processes, for high speed communication. The DQLMS algorithm is extended to the widely linear model forming the WL-DQLMS algorithm in order for the algorithm to be able to capture the full second order statistics. …”
Get full text
Get full text
Get full text
Thesis -
15
Scalable rekeying algorithm in IEEE 802.16e
Published 2011“…SRA is introduced with linear linked list structure in order to make the system more scalable. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…In order to keep information secured while transmission, the system was incorporated with cipher algorithms. The block cipher AES (Advanced Encryption Standard) is used for authentication and key distribution while the stream cipher that is based on the linear feedback shift register (LFSR) is used for confidentiality. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
-
19
-
20
