Search Results - (( bandwidth extraction algorithm ) OR ( bandwidth encryption algorithm ))
Search alternatives:
- bandwidth extraction »
- extraction algorithm »
- bandwidth encryption »
-
1
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
2
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
3
A novel approach to signal encryption: improved version of conventional DSSS scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
4
A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
5
Speech coding techniques and algorithms
Published 2011Get full text
Get full text
Get full text
Book Chapter -
6
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limitations of sensors (bandwidth and energy), the majority of them are symmetric key encryption schemes and some others are asymmetric encryption schemes is not recommended to be used because of high time complexity and consumption demand. …”
Get full text
Get full text
Proceeding Paper -
7
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
8
Development of security in wireless sensor network using IPv6
Published 2009“…The research proposed XOR encryption algorithm that possesses built-in and enhanced security measure. …”
Get full text
Get full text
Thesis -
9
Development of scalable video compression algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
10
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
11
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
12
Parallelizing web scraping to improve performance and scalability
Published 2023“…It employs a message queuing algorithm to divide scraping tasks into smaller units and utilizes multiple worker nodes for concurrent web data extraction. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Study of noise robustness of First Formant Bandwidth (F1BW) method
Published 2011“…Applications that use vowel phonemes require high degree of Standard Malay vowel recognition capability.In Malaysia, researches in vowel recognition is still lacking especially in the usage of Malay vowels, independent speaker systems, recognition robustness and algorithm speed and accuracy. This paper presents a noise robustness study on an improved vowel feature extraction method called First Formant Bandwidth (F1BW) on three classifiers of Multinomial Logistic Regression (MLR), K-Nearest Neighbors (k-NN) and Linear Discriminant Analysis (LDA).Results show that LDA performs best in overall vowel classification compared to MLR and KNN in terms of robustness capability.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
Get full text
Get full text
Thesis -
15
Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E
Published 2013“…The spectrum of constraints which have been extracted from the researched hybrid algorithm includes the static nature by which priorities are assigned and maintained during the entire duration of a transmission time. …”
Get full text
Get full text
Thesis -
16
Performance evaluation of compression techniques on scientific dataset / Lam Wai Leong
Published 2006“…This project looks into various data compression technique and when to use them, with specifically focus on ii evaluating the performance of existing data compression and extraction algorithms that best suit scientific dataset. …”
Get full text
Get full text
Thesis -
17
Multicast-unicast key management and data delivery method in wireless IPv6 networks
Published 2012“…It has the advantage of reducing the required bandwidth of data delivery compared to unicast transmission. …”
Get full text
Get full text
Thesis -
18
A modified digital hysteresis and artificial neural network (ANN) algorithms in single phase shunt active power filter control
Published 2014“…With active power filter (APF) wide knowledge and sophistication in this regard, a high performance extraction algorithm coupled with a fast switching technique must be developed in utilizing this device optimum potential. …”
Get full text
Get full text
Conference or Workshop Item -
19
Design and implementation of multimedia digital matrix system
Published 2005“…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
Get full text
Get full text
Conference or Workshop Item -
20
Evaluation of rehearsal effects of multimedia content based on EEG using machine learning algorithms
Published 2017“…The set of spectral features that are used for analysis are based on the intensity weighted mean frequency (IWMF), its bandwidth (IWBW), and spectral power density (PSD). …”
Get full text
Get full text
Article
