Search Results - (( java application testing algorithm ) OR ( data protection packet algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- protection packet »
- java application »
- packet algorithm »
-
1
Unequal error protection of H.264/AVC video transmitted over wireless network
Published 2015“…This work focus on the problem linked to the transmission of real time video over packet wireless network.Our objective is to define mechanism able to insuring a quality of video in spite to the problems of packet losses and transmission delays characterizing this type of network.The proposed mechanism is based Forward Error Correction (FEC) compatible with the H.264/AVC standard.This mechanism relies on a ratedistortion algorithm controlling the channel rates under a global rate constraint given by the network.This optimization takes into account the type of packet and his length; the tool of data portioning is used in our proposition.This mechanism leading to an unequal error protection of different units of coded sequence.A Reed-Solomon channel coding in application layer is adapted to unequal protected data.The experimentation results indicate the efficiency of our proposition compared to the equal error protection.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
-
4
Protection Schemes for Fiber to the Home Access Networks with Intra Network Switch
Published 2008“…Cost analysis also shows proposed protection schemes are more cost efficient than all existing protection schemes. …”
Get full text
Get full text
Thesis -
5
Efficient mobile video transmission based on a joint coding scheme
Published 2017“…The purpose of this work is on one hand to minimize the Packet Loss Rate (PLR) and, on the other hand to maximize the visual quality of video transmitted over a wireless network (WN).The scheme proposed is founded on a FEC adaptable with the semantics of the H.264/AVC video encoding.This mechanism relies upon a rate distortion algorithm, controlling the channel code rates under the global rate constraints given by the WN.Based on a data partitioning (DP) tool, both packet type and packet length are taken into account by the proposed optimization mechanism which leads to unequal error protection (UEP). …”
Get full text
Get full text
Get full text
Article -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
-
8
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…Furthermore, a trust-based secure routing algorithm is incorporated to dynamically detect misbehavior in terms of packet forwarding for energy-efficient communication among sensor nodes. …”
Get full text
Get full text
Article -
9
-
10
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
14
-
15
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
