Search Results - (( software communication issues algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- software communication »
- communication issues »
- implication based »
- issues algorithm »
- java implication »
-
1
An adaptive flower pollination algorithm for minimizing software testing redundancy
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The root cause of the problem is that the current hardware is not flexible enough to support future communication systems. To address this issue, Software Defined Radio (SDR) plays an important role to bridge the hardware limitation. …”
Get full text
Get full text
Thesis -
3
Scalable rekeying algorithm in IEEE 802.16e
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
-
6
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Performance of MIMO space-time coded system and training based channel estimation for MIMO-OFDM system
Published 2006“…Therefore in this part QR decomposition algorithm has been investigated as a solution. For doing so, the performance analysis between QR decomposition and LS algorithm in terms of MSE (Mean Square Error) and BER (Bit Error Rate) has been done using simulations software. …”
Get full text
Get full text
Thesis -
8
-
9
Comparative Analysis of Neighborhood based Meta-heuristic Algorithms for MC/DC Test Data Generation
Published 2016Get full text
Get full text
Conference or Workshop Item -
10
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…However, the infrastructures of communication still become an issue especially in the remote places. …”
Get full text
Get full text
Get full text
Thesis -
11
Dual authentication for bluetooth connection
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
Get full text
Get full text
Get full text
Article -
12
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…Reducing the effect of optical crosstalk has been a challenging issue considering trade-offs between performance and hardware and software complexity. …”
Get full text
Get full text
Thesis -
13
Pairwise Test Suite Generation Using Adaptive Teaching Learning-Based Optimization Algorithm with Remedial Operator
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Design a Technique for Minimizing Unnecessary Handoff in Mobile Wireless Networks
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…As with all software development, good design and engineering practices are important for software quality. …”
Get full text
Get full text
Thesis -
18
Optimize performance load balancing techniques using binary vote assignment grid quorum (BVAGQ): A systematic review
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
19
An Efficient Clustering Technique for Mobile Wireless Sensor Networks
Published 2014“…Wireless applications are emerging in today’s world especially for monitoring purposes. The key issue in handling this type of communication is the battery lifetime. …”
Get full text
Get full text
Final Year Project -
20
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
Published 2018“…In reducing the limitations in the traditional flow management systems, the most recent measurement methods elevate the accuracy and alleviate cost issues by applying an emerging technology known as Software-Defined Networking (SDN). …”
Get full text
Get full text
Get full text
Thesis
