Search Results - (( _ application rsa algorithm ) OR ( based application ((means algorithm) OR (max algorithm)) ))*
Search alternatives:
- based application »
- application rsa »
- means algorithm »
- rsa algorithm »
- max algorithm »
-
1
-
2
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…For real-time applications, simulation results show that RFuzSAHO decision algorithm enhances the VoIP quality (Mean Opinion Score, MOS) up to 5.4% compared to FuzSAHO algorithm when the MS velocity is 20m/s.…”
Get full text
Get full text
Thesis -
3
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…For fingerprint database optimisation, novel access point (AP) selection algorithms which are based on variant AP selection are investigated to improve computational accuracy compared to existing AP selection algorithms such as Max-Mean and InfoGain. …”
Get full text
Get full text
Thesis -
4
Maximum-largest weighted delay first algorithm for heterogeneous traffic in 4G networks
Published 2018“…Such algorithms are HARQ Aware Scheduling Algorithm (HAS), Retransmission Aware Proportional Fair Algorithm (RAPF), Chase Combining Based Max C/I Scheduling and Maximum- Largest WeightedDealy First algorithm (M-LWDF). …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The first contribution is the AMS scheduling algorithm. The aim is to satisfy QoS requirements for time sensitive applications by exploiting the A-MSDU attributes and adopting the idea of enabling selective retransmission in our scheduling algorithm to obtain aggregation with small size to support time-sensitive applications and enable prioritization according to the QoS requirements of the traffic classes. …”
Get full text
Get full text
Thesis -
6
WiMAX Traffic Forecasting Based On Artificial Intelligence Techniques
Published 2024thesis::doctoral thesis -
7
Digital beamforming implementation of switch-beam smart antenna system by using integrated digital signal processor and field-programmable gate array
Published 2008“…The application targeted for this research is WiMax. Regardless of the application, hardware implementation of smart antenna is very challenging and complicated. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…The computational complexity (total number of arithmetic operations) of proposed LC-QR algorithm is significantly lower than the conventional QR decomposition, zero-forcing (ZF) and minimum mean square error (MMSE) detection algorithm. …”
Get full text
Get full text
Thesis -
11
A study of watermarking methods in medical application
Published 2004Get full text
Get full text
Thesis -
12
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
16
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
A Fuzzy-based mobility prediction in the IEEE 802.16e
Published 2009Get full text
Get full text
Article -
18
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
19
Assessment of forest aboveground biomass estimation from superview-1 satellite image using machine learning approaches / Azinuddin Mohd Asri
Published 2022“…The significant of this study is to prove that the application of object-based image analysis classification and machine learning algorithms for forest aboveground biomass and carbon stock estimation has excellent potential for the future management of forests to maintain their existence and growth.…”
Get full text
Get full text
Thesis -
20
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter
