Search Results - (( linear communication system algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…It is shown via simulation that the combined RLS adaptive algorithm with the linear MMSE multiuser detector provides the best overall performance. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Performance evaluation of direction of arrival (DOA) for linear array antenna design using multiple signal classification (MUSIC) algorithm in variation of displacement vectors and... by Hamzah, Norhayati

    Published 2007
    “…The use of adaptive antenna arrays is one area that gives promise for improving capacity of wireless communication systems and provides improved safety through location capabilities. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Comparison analysis of stream cipher algorithms for digital communication by Mat Sidek, Abd. Rahim, Sha'ameri, Ahmad Zuri

    Published 2007
    “…The stream cipher algorithms evaluated are based on the linear feedback shift register (LFSR) with nonlinear combining function. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  11. 11

    Analyzing communication overhead in linearizing peer to peer system by Muhyiddeen, Abdulfattah, Mohd Nor, Rizal, Rahman, M. M. Hafizur

    Published 2016
    “…In this paper, we present the analysis of overhead of number of messages passed during the construction process of a self-stabilizing linearizing algorithm. This overhead really give some impact on the network, especially in the simulation environment where resources are physically shared by logical nodes.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Scalable rekeying algorithm in IEEE 802.16e by Sadeghi, Mohammad Mehdi Gilanian, Mohd Ali, Borhanuddin, Ma, Maode, Ab Manan, Jamalul-lail, Noordin, Nor Kamariah, Khatun, Sabira

    Published 2011
    “…SRA is introduced with linear linked list structure in order to make the system more scalable. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…The sign function has been implemented in the process of filter coefficients adjustments in order to get faster adaptation processes, for high speed communication. The DQLMS algorithm is extended to the widely linear model forming the WL-DQLMS algorithm in order for the algorithm to be able to capture the full second order statistics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Scalable rekeying algorithm in IEEE 802.16e by Gilanian Sadeghi, Mohammad Mehdi, Borhanuddin, Mohd Ali, Ma, Maode, Jamalul-lail, Ab Manan, Nor Kamariah, Noordin, Sabira, Khatun

    Published 2011
    “…SRA is introduced with linear linked list structure in order to make the system more scalable. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Implementation and integration of HF messaging system with cryptographic features by Mat Sidek, Abd. Rahim

    Published 2006
    “…In order to keep information secured while transmission, the system was incorporated with cipher algorithms. The block cipher AES (Advanced Encryption Standard) is used for authentication and key distribution while the stream cipher that is based on the linear feedback shift register (LFSR) is used for confidentiality. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20