Search Results - (( java implication based algorithm ) OR ( data protection packet algorithm ))

Refine Results
  1. 1

    Unequal error protection of H.264/AVC video transmitted over wireless network by Rima, Boudjadja, Mohamed, Azni, Nadjib, Zennir M.

    Published 2015
    “…This work focus on the problem linked to the transmission of real time video over packet wireless network.Our objective is to define mechanism able to insuring a quality of video in spite to the problems of packet losses and transmission delays characterizing this type of network.The proposed mechanism is based Forward Error Correction (FEC) compatible with the H.264/AVC standard.This mechanism relies on a ratedistortion algorithm controlling the channel rates under a global rate constraint given by the network.This optimization takes into account the type of packet and his length; the tool of data portioning is used in our proposition.This mechanism leading to an unequal error protection of different units of coded sequence.A Reed-Solomon channel coding in application layer is adapted to unequal protected data.The experimentation results indicate the efficiency of our proposition compared to the equal error protection.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Protection Schemes for Fiber to the Home Access Networks with Intra Network Switch by P'ng, Won Tiang

    Published 2008
    “…Cost analysis also shows proposed protection schemes are more cost efficient than all existing protection schemes. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Efficient mobile video transmission based on a joint coding scheme by Azni, Mohamed, Boudjadja, Rima, Dahmani, Abdelnasser, Zennir, Mohamed Nadjib

    Published 2017
    “…The purpose of this work is on one hand to minimize the Packet Loss Rate (PLR) and, on the other hand to maximize the visual quality of video transmitted over a wireless network (WN).The scheme proposed is founded on a FEC adaptable with the semantics of the H.264/AVC video encoding.This mechanism relies upon a rate distortion algorithm, controlling the channel code rates under the global rate constraints given by the WN.Based on a data partitioning (DP) tool, both packet type and packet length are taken into account by the proposed optimization mechanism which leads to unequal error protection (UEP). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…Furthermore, a trust-based secure routing algorithm is incorporated to dynamically detect misbehavior in terms of packet forwarding for energy-efficient communication among sensor nodes. …”
    Get full text
    Get full text
    Article
  7. 7

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector by Abdulkader, Zaid A.

    Published 2018
    “…Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Multicast-unicast key management and data delivery method in wireless IPv6 networks by Zare Anari, Abbas Mehdizadeh

    Published 2012
    “…In regard to security, the main challenge is to provide security protection to data which are multicast to many users. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed,, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Majeed Alhammadi, Nafea Ali, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…Secondly, a new scheme based on a chaos system will be implemented for voice data. In order to achieve the second objective, a study had been carried out on other proposed schemes mainly the Hierarchical Data Security Protection (HDSP) for VoIP. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2022
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article