Search Results - (( simulation equalization based algorithm ) OR ( program implementation rsa algorithm ))
Search alternatives:
- simulation equalization »
- program implementation »
- implementation rsa »
- rsa algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
-
4
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
5
Encryption Technology on Windows Workstation
Published 2004“…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
Get full text
Get full text
Final Year Project -
6
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
7
-
8
Reduced-rank technique for joint channel estimation in TD-SCDMA systems.
Published 2013“…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
9
Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems
Published 2012“…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
10
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
11
Enhanced handover decision algorithm in heterogeneous wireless network
Published 2017“…It also employs three types of vertical handover decision algorithms: equal priority, mobile priority and network priority. …”
Get full text
Get full text
Get full text
Article -
12
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
13
Preserving brightness in histogram equalization based contrast enhancement techniques
Published 2023Article -
14
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…It is performed by the scheduling algorithm implemented in the Long Term Evolution (LTE) base station, Evolved Node B. …”
Get full text
Get full text
Thesis -
15
Selective harmonic elimination in multilevel inverter using hybrid APSO algorithm
Published 2018“…The proposed algorithm is applicable to all levels of MLI having equal and non-equal DC sources. …”
Get full text
Get full text
Article -
16
Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems
Published 2021“…To solve this problem, a new cooperative NOMA system is introduced, in which we first, propose a receiver equalizer at weak user known as weak user beam-matching (WBM) equalizer based on deviceto- device (D2D) channel state information (CSI) sharing between the nearby strong and weak users. …”
Get full text
Get full text
Thesis -
17
Exp-bet packet scheduling algorithm for multiple traffic services in long term evolution (LTE) system / Ku Siti Syahidah Ku Mohd Noh
Published 2016“…The simulation process has been done using the LTE-Sim simulator and the performance of these packet scheduling algorithms were evaluated based on the performance metric of fairness index, throughput, packet loss rate and delay for VoIP, video and best effort flows. …”
Get full text
Get full text
Thesis -
18
-
19
Indoor global path planning based on critical cells using dijkstra algorithm
Published 2015“…Simulations results show that the proposed algorithm enhances performance and speed compared to the traditional Dijkstra’s algorithm.…”
Get full text
Get full text
Article -
20
Simulation Based Analysis of Kinematics, Dynamics and Control of Space Robots
Published 1996“…In the simulation results, a satellite-based three degrees of freedom robot was simulated using schematic illustrations. …”
Get full text
Get full text
Thesis
