Search Results - (( bubble detection method algorithm ) OR ( digital communication between algorithm ))
Search alternatives:
- digital communication »
- communication between »
- between algorithm »
- method algorithm »
-
1
-
2
Charge coupled device based on optical tomography system in detecting air bubbles in crystal clear water
Published 2024“…Experiments in detecting moving air bubbles are conducted. The images of captured data are reconstructed based on filtered image of Linear Back Projection with Hybrid algorithms. …”
Article -
3
-
4
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…Email is the most important communications system in the world. However the internet traffic between the sender and recipient is routed through many countries, even they live on the same area and the content of email messages are generally not encrypted and unsecured. …”
Get full text
Get full text
Thesis -
5
Implementation of Station-To-Station (STS) protocol using Elliptic Curve Digital Signature Al Algorithm / Muhammad Faris Fakhri Rozi, Alya Syuhada Ismail and Emylia Suhaimi
Published 2018“…Elliptic Curve Digital Signature Algorithms (ECDSA) is implemented in Station-To¬ Station protocol in order to give an improvement in the secret key exchange between two parties. …”
Get full text
Get full text
Student Project -
6
Charge-coupled device based on optical tomography system in detecting solid and transparent objects in non-flowing crystal clear water
Published 2024“…Experiments in detecting static solid, transparent objects and moving air bubbles are conducted. …”
Article -
7
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
8
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
9
Charge-coupled device based on optical tomography system in detecting solid and transparent objects in non-flowing crystal clear water
Published 2024journal::journal article -
10
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
11
High image quality watermarking model by using genetic algorithm
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
12
Bit-error rate performance analysis of spectrum based detector for FSK digital modulation
Published 2003Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. …”
Get full text
Get full text
Thesis -
15
-
16
Light weight deep learning algorithm for voice call quality of services (Qos) in cellular communication
Published 2022“…In this paper, a deep learning algorithm was proposed to ensure the voice call quality of the cellular communication networks. …”
Get full text
Get full text
Get full text
Article -
17
Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.]
Published 2021“…Thus, in this paper propose the new algorithm in Station to Station (STS) protocol by implementing Lamport digital signature to provide the authentication in DHKE protocol.…”
Get full text
Get full text
Monograph -
18
Video encryption using computation between H.264/AVC and AES encryption algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
19
-
20
A review on multimedia communications cryptography
Published 2011“…It is a comparative study between symmetric key encryption and asymmetric key encryption in achieving an efficient, flexible and secure video data…”
Get full text
Get full text
Get full text
Article
