Search Results - (( _ application based algorithm ) OR ( wave applications security algorithm ))
Search alternatives:
-
1
-
2
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…In order to keep information secured while transmission, the system was incorporated with cipher algorithms. …”
Get full text
Get full text
Get full text
Thesis -
3
Dual authentication for bluetooth connection
Published 2014Get full text
Get full text
Get full text
Article -
4
Access control and classifier-based blockchain technology in e-healthcare applications
Published 2023Book Chapter -
5
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004Get full text
Get full text
Final Year Project -
6
Secured mobile transaction using NFC Technology: Top-Up printing system
Published 2011“…As proof of concept, a Top-up printing system is developed and for interaction with the web interface, an ACR 100 Reader with ACOS3 SIM card is used. As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
NFC secured online transaction in mobile computing business
Published 2012“…As proof of concept, a Top-up printing system is developed and for interaction with contactless interface, an ACR 100 Reader with ACOS3 SIM card is used. As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
Get full text
Get full text
Get full text
Article -
8
Optical soliton perturbation with quadratic-cubic nonlinearity / Mir Asma
Published 2020“…This study is an addendum to the previously reported results on optical solitons solely, in view of the fact that, its fundamental nature as well as its potential applications to optoelectronic communication. Analytical results open up a new horizon of experiments with optical solitons to facilitate a soliton based optical communication system. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
-
11
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…There are several block-matching algorithm based on block-based motion estimation techniques have been developed. …”
Get full text
Get full text
Get full text
Book Chapter -
12
-
13
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…On the second level, TOPSIS algorithm allocates resources among an application’s user based on their criteria and the application’s preferences. …”
Get full text
Get full text
Thesis -
15
A simulation based fly optimisation algorithm for swarms of mini autonomous surface vehicles application
Published 2011“…Present paper intends to provide a detailed description of a new bio-inspired Metaheuristic Algorithm. Based on the detailed study of the Drosophila, the flowchart behaviour for the algorithm, code implementation, methodologies and simulation analysis, a novel Fly Optimization Algorithm (FOA) approach is presented. …”
Get full text
Get full text
Get full text
Article -
16
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
Get full text
Get full text
Thesis -
18
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…In this study, we are looking at the performance of four graph-based path planning algorithms which is Breadth First Search, Depth First Search, Dijkstra and A*, when implemented in real world applications. …”
Get full text
Get full text
Final Year Project -
19
Harmony Search-Based Fuzzy Clustering Algorithms For Image Segmentation
Published 2011“…Various images from different application domains, including synthetic and real-world images, have been used in this thesis to show the applicability of the proposed algorithms. …”
Get full text
Get full text
Thesis -
20
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis
