Search Results - bandwidth ((((estimation algorithm) OR (detection algorithm))) OR (encryption algorithm))
Search alternatives:
-
1
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
Get full text
Get full text
Thesis -
2
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
3
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…This algorithm can also work for big number of SUs that detect the OFDM signal. …”
Get full text
Get full text
Thesis -
4
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
5
A modified Otsu’s algorithm for improving the performance of the energy detector in cognitive radio
Published 2017“…In this paper, we present a modified Otsu’s algorithm for solving the automatic threshold estimation problem in energy detection based Cognitive Radio (CR) application. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
7
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…Therefore, an active available bandwidth estimation technique was incorporated in the proposed solution. …”
Get full text
Get full text
Thesis -
8
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
9
A modified Otsu's algorithm for improving the performance of the energy detector in cognitive radio
Published 2017“…In this paper, we present a modified Otsu's algorithm for solving the automatic threshold estimation problem in energy detection based Cognitive Radio (CR) application. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
11
Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems
Published 2018“…Fusing different reconstruction algorithms may result in the probability of fusing several incorrectly estimated indices over noisy channels. …”
Get full text
Get full text
Thesis -
12
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
13
A novel approach to signal encryption: improved version of conventional DSSS scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
14
A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
15
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Active measurement techniques performed by overlay nodes can provide bandwidth estimations of an end-to-end overlay path. …”
Get full text
Get full text
Thesis -
16
Speech coding techniques and algorithms
Published 2011Get full text
Get full text
Get full text
Book Chapter -
17
Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi
Published 2012“…This thesis is concerned with algorithm optimization and efficient low cost architecture design for integer motion estimation (IME) and sub-pixel motion estimation (SME) of H.264/AVC. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS
Published 2011“…Various multi resolution techniques are used that include wavelet based spectrum estimation and spectral hole detection, wavelet based multi-resolution in analog domain and multi-resolution multiple antenna based detection. …”
Get full text
Get full text
Thesis -
19
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi
Published 2016“…Performance shows the bandwidth controlled as bandwidth save, processing time, bucket capacity and cost. …”
Get full text
Get full text
Article -
20
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi
Published 2016“…Performance shows the bandwidth controlled as bandwidth save, processing time, bucket capacity and cost. …”
Get full text
Get full text
Thesis
