Search Results - (( data protection packet algorithm ) OR ( java application using algorithm ))
Search alternatives:
- protection packet »
- packet algorithm »
- java application »
- using algorithm »
-
1
Unequal error protection of H.264/AVC video transmitted over wireless network
Published 2015“…This work focus on the problem linked to the transmission of real time video over packet wireless network.Our objective is to define mechanism able to insuring a quality of video in spite to the problems of packet losses and transmission delays characterizing this type of network.The proposed mechanism is based Forward Error Correction (FEC) compatible with the H.264/AVC standard.This mechanism relies on a ratedistortion algorithm controlling the channel rates under a global rate constraint given by the network.This optimization takes into account the type of packet and his length; the tool of data portioning is used in our proposition.This mechanism leading to an unequal error protection of different units of coded sequence.A Reed-Solomon channel coding in application layer is adapted to unequal protected data.The experimentation results indicate the efficiency of our proposition compared to the equal error protection.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Protection Schemes for Fiber to the Home Access Networks with Intra Network Switch
Published 2008“…Cost analysis also shows proposed protection schemes are more cost efficient than all existing protection schemes. …”
Get full text
Get full text
Thesis -
4
Efficient mobile video transmission based on a joint coding scheme
Published 2017“…The purpose of this work is on one hand to minimize the Packet Loss Rate (PLR) and, on the other hand to maximize the visual quality of video transmitted over a wireless network (WN).The scheme proposed is founded on a FEC adaptable with the semantics of the H.264/AVC video encoding.This mechanism relies upon a rate distortion algorithm, controlling the channel code rates under the global rate constraints given by the WN.Based on a data partitioning (DP) tool, both packet type and packet length are taken into account by the proposed optimization mechanism which leads to unequal error protection (UEP). …”
Get full text
Get full text
Get full text
Article -
5
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
6
-
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
-
9
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
11
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…Furthermore, a trust-based secure routing algorithm is incorporated to dynamically detect misbehavior in terms of packet forwarding for energy-efficient communication among sensor nodes. …”
Get full text
Get full text
Article -
12
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
14
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
15
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project -
20
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
Get full text
Get full text
Get full text
Thesis
