Search Results - (( _ estimation methods algorithm ) OR ( field communication system algorithm ))

Refine Results
  1. 1
  2. 2

    Enhanced PAPR reduction and channel estimation techniques in multi-carrier wireless communication system by Ali Kareem, Nahar

    Published 2016
    “…Besides, the proposed channel estimator was tested under fast fading channel in a multi-carrier communication system with and without interpolation methods. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…The second part contributes to the field of dynamic transmit antenna shuffling scheme for MIMO system to maximize the system capacity and reducing BER. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Early detection of breast cancer using wave elliptic equation with high performance computing by Alias, Norma, Rosly, Nur Syazana, Satam, Noriza, A. Ghaffar, Zarith Safiza, Islam, Md. Rajibul

    Published 2008
    “…This paper focuses on the implementation of parallel algorithm for the simulation of breast cancer tumor using two dimensional Helmholtz’s wave equation on a distributed parallel computer system (DPCS). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Enhancing location estimation accuracy by utilizing time difference of arrival techniques for wireless network by Md Mahyuddin, Mohamad Fahmi

    Published 2020
    “…Mobile communication, which is one of the major areas in telecommunication has been developing rapidly due to the advances of technology in the fields of mobile and wireless communications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff by Fatin Nabila , Abd Latiff

    Published 2021
    “…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R.

    Published 2023
    “…The system can cipher the data using PRINCE algorithm on a VIRTEX-403 FPGA evaluation board and using GSM modems to communicate over a cellular network. …”
    Article
  9. 9

    Securing electrical substation's wireless messaging with a lightweight crypto-algorithm IP core by Abbas Y.A., Jidin R., Jami N., Z'aba M.R.

    Published 2023
    “…The crypto-algorithm has been implemented within an environment of microprocessor system on a XILINX Field Programmable Logic Arrays chip. …”
    Conference Paper
  10. 10

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…The rank-based methods, estimating algorithms, and resampling techniques that are developed do not involve the difficulties of the existing estimating procedures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…This estimation method is equivalent to maximum likelihood estimation at convergence. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Adaptive Noise Cancellation Systems using Selectable Algorithm by Roshahliza, M. Ramli, Salina, Abdul Samad

    Published 2016
    “…The book targets DSP designers, researchers and postgraduate students in the field of DSP for mobile communication systems. The book provides analysis of the results obtained from subjecting the developed system to environmental noise.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  14. 14

    An improved public key cryptography based on the elliptic curve by Al-Daoud, Essam Faleh

    Published 2002
    “…Meanwhile, the size of the public keys are reduced by 37 to 48 percent. The improved algorithms are applied to the on-line and off-line electronic payments systems, which lead to probably the best solution to reduce the objects size and enhance the performance in both systems.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Field theory analysis for wireless infrared system's error correction by Jatoi, M.A., Kamel, N., Ousta, F., Gardezi, S.J.S.

    Published 2014
    “…This paper provides a brief account on field theory used for error correction in wireless infrared systems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Such approach is highly dependable on the clustering algorithm parameterization, and is not capable to deal with the normal system’s specification changes. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing by Elrasheed Ismail, Sultan

    Published 2013
    “…Cloud Computing systems are widely applied in many fields such as communication data management, web application, network monitoring, financial management and so on. …”
    Get full text
    Thesis
  20. 20

    New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique by Hamid, Nurul 'Atiqah

    Published 2016
    “…These 6 algorithms are divided into 3 main methods namely Method A, Method B, and Method C depending on their search patterns and strategies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis