Search Results - (( java application testing algorithm ) OR ( data protection packet algorithm ))

Refine Results
  1. 1

    Unequal error protection of H.264/AVC video transmitted over wireless network by Rima, Boudjadja, Mohamed, Azni, Nadjib, Zennir M.

    Published 2015
    “…This work focus on the problem linked to the transmission of real time video over packet wireless network.Our objective is to define mechanism able to insuring a quality of video in spite to the problems of packet losses and transmission delays characterizing this type of network.The proposed mechanism is based Forward Error Correction (FEC) compatible with the H.264/AVC standard.This mechanism relies on a ratedistortion algorithm controlling the channel rates under a global rate constraint given by the network.This optimization takes into account the type of packet and his length; the tool of data portioning is used in our proposition.This mechanism leading to an unequal error protection of different units of coded sequence.A Reed-Solomon channel coding in application layer is adapted to unequal protected data.The experimentation results indicate the efficiency of our proposition compared to the equal error protection.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Protection Schemes for Fiber to the Home Access Networks with Intra Network Switch by P'ng, Won Tiang

    Published 2008
    “…Cost analysis also shows proposed protection schemes are more cost efficient than all existing protection schemes. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Efficient mobile video transmission based on a joint coding scheme by Azni, Mohamed, Boudjadja, Rima, Dahmani, Abdelnasser, Zennir, Mohamed Nadjib

    Published 2017
    “…The purpose of this work is on one hand to minimize the Packet Loss Rate (PLR) and, on the other hand to maximize the visual quality of video transmitted over a wireless network (WN).The scheme proposed is founded on a FEC adaptable with the semantics of the H.264/AVC video encoding.This mechanism relies upon a rate distortion algorithm, controlling the channel code rates under the global rate constraints given by the WN.Based on a data partitioning (DP) tool, both packet type and packet length are taken into account by the proposed optimization mechanism which leads to unequal error protection (UEP). …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  7. 7
  8. 8

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…Furthermore, a trust-based secure routing algorithm is incorporated to dynamically detect misbehavior in terms of packet forwarding for energy-efficient communication among sensor nodes. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector by Abdulkader, Zaid A.

    Published 2018
    “…Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19
  20. 20