Search Results - bandwidth ((((electron algorithm) OR (encryption algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
2
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
3
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
4
Speech coding techniques and algorithms
Published 2011Get full text
Get full text
Get full text
Book Chapter -
5
A traffic signature-based algorithm for detecting scanning internet worms
Published 2009“…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
Get full text
Get full text
Get full text
Article -
6
Development of scalable video compression algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
7
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
8
Development of security in wireless sensor network using IPv6
Published 2009“…The research proposed XOR encryption algorithm that possesses built-in and enhanced security measure. …”
Get full text
Get full text
Thesis -
9
A modified Otsu's algorithm for improving the performance of the energy detector in cognitive radio
Published 2017“…In this paper, we present a modified Otsu's algorithm for solving the automatic threshold estimation problem in energy detection based Cognitive Radio (CR) application. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri
Published 2007“…This elicitation is used the scenario-based technique to identify the requirement. We also proposed algorithm of bandwidth detection in order to detect the bandwidth of a current network. …”
Get full text
Get full text
Thesis -
11
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
12
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…The goal behind this scheme is to detect invisible patches that are either occurred in a dusky areas of the image or have been deliberately hidden during the encryption process. …”
Get full text
Get full text
Thesis -
13
A modified Otsu’s algorithm for improving the performance of the energy detector in cognitive radio
Published 2017“…In this paper, we present a modified Otsu’s algorithm for solving the automatic threshold estimation problem in energy detection based Cognitive Radio (CR) application. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Biologically inspired network on chip fault tolerant algorithm using time division multiplexing
Published 2017“…The technique is fault tolerant as it detects and bypass the faulty interconnects. With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
Get full text
Get full text
Article -
15
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
16
A novel approach to signal encryption: improved version of conventional DSSS scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
17
A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
18
Elliptical ultra-wideband antenna sensor with modified time reversal algorithm for breast tumour localization
Published 2022“…A novel weighted Time Reversal algorithm is introduced to improve the image quality along with removing the clutter in the imaging environment. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems
Published 2018“…Additionally, at BER value of 2×10−3 the proposed CoFA and SdMP algorithms for CE have around 9%, 14%, 19.5% and 25% and around 5%, 10%, 14% and 22.5% performance improvement when compared to FACS, gOMP, OMP and ROMP algorithms, respectively.…”
Get full text
Get full text
Thesis -
20
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013Get full text
Get full text
Thesis
