160 results on '"El-Bendary, Mohsen"'
Search Results
2. Efficient utilization of adaptive LMS channel estimation with activity detection guidance and tap decoupling in indoor optical wireless communication systems
3. Utilization of adaptive techniques for channel estimation and intrusion detection in OWC systems
4. Optimum Piezo-Electric Based Energy Harvesting for Low-Power Wireless Networks with Power Complexity Considerations
5. Audio SIMO system based on visible light communication using cavity LEDs
6. Different attacks presence considerations: analyzing the simple and efficient self-marked algorithm performance for highly-sensitive audio signals contents verification
7. An efficient hidden marking approach for forensic and contents verification of digital images
8. Immunity of Signals Transmission Using Secured Unequal Error Protection Scheme with Various Packet Format
9. Efficient Multiple 4-Bit ALU Designs for Fast Computation and Reduced Area
10. Confidentiality considerations: multimedia signals transmission over different wireless channels utilized efficient secured model
11. Immunity of Signals Transmission Using Secured Unequal Error Protection Scheme with Various Packet Format
12. Medical images transmission over Wireless Multimedia Sensor Networks with high data rate
13. Reliable Mark-Embedded Algorithm for Verifying Archived/Encrypted Image Contents in Presence Different Attacks with FEC Utilizing Consideration
14. Performance Enhancing of Nano-scale Technologies in Nuclear Applications Using C-MOS and FS-GDI Hybrid Approach
15. WPAN-Bluetooth Simulation Scenarios Using Block Codes
16. Simulation Scenarios of Pseudo-coding Techniques
17. WPAN Simulation Scenarios-2 with the Different Coding
18. WPANs Technologies Beginning
19. Error Control Schemes
20. Introduction
21. Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security
22. Robust and Sophisticated Combined-Layered Security: Secured 6G Mobile Network Considerations
23. Effects of Partially/Masked Face on the Personality Identifying: Self-Multimodal Fusion Consideration
24. Complexity considerations: efficient image transmission over mobile communications channels
25. Appendix
26. Lower Complexity of Secured WSN Networks
27. Wireless Networks
28. Sensing and Environment Concepts
29. Throughput Study of Low-Rate Communications
30. WSN Security Needs
31. Introduction
32. Flexible Multi-Layered Security System: Secure 6G Mobile Network Considerations
33. Efficient utilization of adaptive LMS channel estimation with activity detection guidance and tap decoupling in indoor optical wireless communication systems
34. Spatial and Frequency based Data Hiding Steganography: Performance analysis Utilizing Various Classified Messages
35. FS-GDI Based Area Efficient Hamming (11, 7) Encoding.
36. Implementation of Novel Block and Convolutional Encoding Circuit Using FS-GDI.
37. SVD Audio Watermarking: A Tool to Enhance the Security of Image Transmission over ZigBee Networks
38. An Efficient Chaotic Interleaver for Image Transmission over IEEE 802.15.4 Zigbee Network
39. FS-GDI Based Area Efficient Hamming (11, 7) Encoding
40. Utilization of Raptor Codes for OFDM-System Performance Enhancing
41. Performance Improvement of Digital Image Transmission over Mobile WiMAX Networks
42. Implementation of Novel Block and Convolutional Encoding Circuit Using FS-GDI
43. Wireless Personal Communications
44. FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks
45. Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering
46. Content Verification of Encrypted Images Transmitted Over Wireless AWGN Channels
47. Deep Learning Based Approach: An Efficient Anomaly Detecting from Various Medical Signals and Medical Images Using CNNs
48. Performance enhancing of MIMO‐OFDM system utilizing different interleaving techniques with rate‐less fountain raptor code
49. Efficient audio integrity verification algorithm using discrete cosine transform
50. Efficient Transmission of Encrypted Images with OFDM in the Presence of Carrier Frequency Offset
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.