Search Results - bandwidth ((((function algorithm) OR (evolutionary algorithm))) OR (encryption algorithm))

Refine Results
  1. 1

    Enhanced chaotic image encryption algorithm based on Baker's map by Salleh, Mazleena, Ibrahim, Subariah, lsnin, Fauz

    Published 2003
    “…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
    Get full text
    Get full text
    Article
  2. 2

    Hybrid harmony search algorithm for continuous optimization problems by Ala’a Atallah, Hamad Alomoush

    Published 2020
    “…The first benchmarking set consists of 24 classical benchmark unimodal and multimodal functions whilst the second benchmark set contains 30 state-of-the-art benchmark functions from the Congress on Evolutionary Computation (CEC). …”
    Get full text
    Get full text
    Thesis
  3. 3

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…The neural network architecture that can be used to implement a nonlinear vector predictor, including a multilayer perceptron (MLP), and a radial basis function network. In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A novel approach to signal encryption: improved version of conventional DSSS scheme by Mohd Abdur, Rashid, Saiful Bahri, Mohamed, A., Hiral, N., Sakibr

    Published 2011
    “…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
    Get full text
    Get full text
    Article
  6. 6

    A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme by -, Mohd Abdur Rashid, Mohamed, Saiful Bahri, -, A. Hiral, -, N. Sakibr

    Published 2011
    “…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limitations of sensors (bandwidth and energy), the majority of them are symmetric key encryption schemes and some others are asymmetric encryption schemes is not recommended to be used because of high time complexity and consumption demand. …”
    Get full text
    Get full text
    Proceeding Paper
  9. 9
  10. 10

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi by Azmi, Aini

    Published 2016
    “…Performance shows the bandwidth controlled as bandwidth save, processing time, bucket capacity and cost. …”
    Get full text
    Get full text
    Article
  12. 12

    Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi by Azmi, Aini

    Published 2016
    “…Performance shows the bandwidth controlled as bandwidth save, processing time, bucket capacity and cost. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Development of security in wireless sensor network using IPv6 by Jayapal, Vikneswary

    Published 2009
    “…The research proposed XOR encryption algorithm that possesses built-in and enhanced security measure. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A fast and simple method of spectral enhancement by Sajid, Muhammad, Ghosh, Deva

    Published 2014
    “…We developed an algorithm that improved the bandwidth of the seismic data without greatly boosting high-frequency noise. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat

    Published 2017
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Book Section
  18. 18

    A fast and simple method of spectral enhancement by Sajid, M., Ghosh, D.

    Published 2014
    “…To achieve high resolution, the seismic data must have broad frequency bandwidth. We developed an algorithm that improved the bandwidth of the seismic data without greatly boosting high-frequency noise. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Policing and Shaping algorithms are identified as one of the task in bandwidth control, especially in tele-traffic engineering and computer network. …”
    Get full text
    Get full text
    Article