Search Results - bandwidth ((((prediction algorithm) OR (encryption algorithm))) OR (detection algorithm))
Search alternatives:
-
1
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
2
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
3
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
4
Hybrid of rough set theory and Artificial Immune Recognition System as a solution to decrease false alarm rate in intrusion detection system
Published 2024Subjects:Conference Paper -
5
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…FPF of SVM have merged the analyzed results of flexible packet filtering with support vector machine algorithm to get better classification of the captured network traffics and to detect anomalies. …”
Get full text
Get full text
Get full text
Thesis -
6
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
7
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
8
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…The goal behind this scheme is to detect invisible patches that are either occurred in a dusky areas of the image or have been deliberately hidden during the encryption process. …”
Get full text
Get full text
Thesis -
9
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…In the following study, the radio bandwidth's energy consumption is the target under study, which in turn is predicted to optimize WSN.…”
Article -
10
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
11
A novel approach to signal encryption: improved version of conventional DSSS scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
12
A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
13
Design and implementation of multimedia digital matrix system
Published 2005“…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
Get full text
Get full text
Conference or Workshop Item -
14
Speech coding techniques and algorithms
Published 2011Get full text
Get full text
Get full text
Book Chapter -
15
From sensing to predictions and database technique: a review of TV white space information acquisition in cognitive radio networks
Published 2017“…The evolution trends are spectrum sensing, prediction algorithm and recently, geo-location database technique. …”
Get full text
Get full text
Get full text
Article -
16
Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing
Published 2022“…The proposed approach, Energy-Aware Multi-Dimensional Online Bin Packing (EAMDOBP), was tested against Power-aware best fit decreasing algorithm (PABFD), Modified Worst Fit decreasing algorithm (MWFD) and Hybrid Local Regression Host Overload Detection (HLRHOD). …”
Get full text
Get full text
Get full text
Thesis -
17
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limitations of sensors (bandwidth and energy), the majority of them are symmetric key encryption schemes and some others are asymmetric encryption schemes is not recommended to be used because of high time complexity and consumption demand. …”
Get full text
Get full text
Proceeding Paper -
18
Adaptive Quality Of Service Call Admission Control With User Mobility Prediction For Multimedia Traffic Over Wireless Networks
Published 2003“…Based on the mobility prediction, bandwidth is reserved to guarantee the uninterrupted hand off process. …”
Get full text
Get full text
Thesis -
19
Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks
Published 2008“…The second proposed scheme is a bandwidth reservation scheme based on Mobility Prediction Scheme (MPS). …”
Get full text
Get full text
Thesis -
20
Enhanced Bandwidth Based Handover Decision Making Algorithm For Small Cell Wireless Networks
Published 2020“…To overcome this problem, this paper proposed a new handover decision making algorithm that integrates the traveling distance prediction technique with the bandwidth based handover algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article
