Search Results - bandwidth ((((function algorithm) OR (encryption algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
2
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…The neural network architecture that can be used to implement a nonlinear vector predictor, including a multilayer perceptron (MLP), and a radial basis function network. In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. …”
Get full text
Get full text
Thesis -
3
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
4
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
5
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
6
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
7
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
8
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
9
A novel approach to signal encryption: improved version of conventional DSSS scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
10
A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
11
Speech coding techniques and algorithms
Published 2011Get full text
Get full text
Get full text
Book Chapter -
12
Design and implementation of multimedia digital matrix system
Published 2005“…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
Get full text
Get full text
Conference or Workshop Item -
13
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
Get full text
Get full text
Thesis -
14
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limitations of sensors (bandwidth and energy), the majority of them are symmetric key encryption schemes and some others are asymmetric encryption schemes is not recommended to be used because of high time complexity and consumption demand. …”
Get full text
Get full text
Proceeding Paper -
15
CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS
Published 2011“…However, the basic idea is the same - the total bandwidth is sensed using coarse resolution energy detection, then, fine sensing is applied to the portion of interest. …”
Get full text
Get full text
Thesis -
16
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi
Published 2016“…Performance shows the bandwidth controlled as bandwidth save, processing time, bucket capacity and cost. …”
Get full text
Get full text
Article -
17
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi
Published 2016“…Performance shows the bandwidth controlled as bandwidth save, processing time, bucket capacity and cost. …”
Get full text
Get full text
Thesis -
18
Development of security in wireless sensor network using IPv6
Published 2009“…The research proposed XOR encryption algorithm that possesses built-in and enhanced security measure. …”
Get full text
Get full text
Thesis -
19
A fast and simple method of spectral enhancement
Published 2014“…We developed an algorithm that improved the bandwidth of the seismic data without greatly boosting high-frequency noise. …”
Get full text
Get full text
Article -
20
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis
