Search Results - (( software communication issues algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Modem Recognition Algorithm for Software Defined Radio Base Station by Rukumangatha Rajah, Sivaraman

    Published 2004
    “…The root cause of the problem is that the current hardware is not flexible enough to support future communication systems. To address this issue, Software Defined Radio (SDR) plays an important role to bridge the hardware limitation. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Performance of MIMO space-time coded system and training based channel estimation for MIMO-OFDM system by Abdolee, Reza

    Published 2006
    “…Therefore in this part QR decomposition algorithm has been investigated as a solution. For doing so, the performance analysis between QR decomposition and LS algorithm in terms of MSE (Mean Square Error) and BER (Bit Error Rate) has been done using simulations software. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Implementation and integration of HF messaging system with cryptographic features by Mat Sidek, Abd. Rahim

    Published 2006
    “…However, the infrastructures of communication still become an issue especially in the remote places. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Dual authentication for bluetooth connection by Saliou, Diallo Alhassane, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks by Raja Mohd Auzar, Tengku Dian Shahida

    Published 2009
    “…Reducing the effect of optical crosstalk has been a challenging issue considering trade-offs between performance and hardware and software complexity. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…As with all software development, good design and engineering practices are important for software quality. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    An Efficient Clustering Technique for Mobile Wireless Sensor Networks by Azman, Nurul Syafiqah

    Published 2014
    “…Wireless applications are emerging in today’s world especially for monitoring purposes. The key issue in handling this type of communication is the battery lifetime. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei by Hamid , Tahaei

    Published 2018
    “…In reducing the limitations in the traditional flow management systems, the most recent measurement methods elevate the accuracy and alleviate cost issues by applying an emerging technology known as Software-Defined Networking (SDN). …”
    Get full text
    Get full text
    Get full text
    Thesis