Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,935,575 papers from all fields of science
Search
Sign In
Create Free Account
BitTorrent protocol encryption
Known as:
Bittorrent encryption
, MSE/PE
, Message Stream Encryption
Expand
Protocol encryption (PE), message stream encryption (MSE) or protocol header encrypt (PHE) are related features of some peer-to-peer file-sharing…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
BitComet
BitTorrent (software)
Confidentiality
Disintermediation
Expand
Broader (1)
BitTorrent
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Novel Performance Analysis of DCT, DWT and Fractal Coding in Image Compression
D. Jagannadham
,
G. Raju
,
D. V. S. Narayana
2020
Corpus ID: 213705783
In digital image processing, image compression has prominent significance to improve the storage capacity, transmission bandwidth…
Expand
2018
2018
STATISTICAL VALIDATION OF PATIENT VITAL SIGNS BASED ON ENERGY-EFFICIENT WIRELESS SENSOR NETWORK MONITORING SYSTEM
A. Fakhri
,
S. Gharghan
,
S. Mohammed
2018
Corpus ID: 165160050
Vital signs taken from the patient's body has gained significant interest among researchers studying disease diagnosis. To…
Expand
2017
2017
An Improved JPEG Image Compression Algorithm by Modifying Luminance Quantization Table
Pranab Lamia Alam1
,
Kumar Dhar1
,
Mirza A. F. M. Rashidul Hasan2
,
Mohammed Golam
,
Sarwar Bhuyan3
,
Golam Moktader Daiyan4
2017
Corpus ID: 212455937
Summary JPEG has been widely used for lossy image compression. In this paper, we introduce an improved JPEG compression algorithm…
Expand
2015
2015
Denoising EEG Signal Using Wavelet Transform
R. Princy
,
P. Thamarai
2015
Corpus ID: 30936540
Electroencephalogram (EEG) signal is the recording of spontaneous electrical activity of the brain over a small interval of time…
Expand
2015
2015
A High-accuracy Self-adaptive Resource Demands Predicting Method in IaaS Cloud Environment
Zhijia Chen
,
Yuanchang Zhu
,
Yanqiang Di
,
Shaochong Feng
,
Jingtao Geng
2015
Corpus ID: 28634133
In IaaS (Infrastructure as a Service) cloud environment, users are provisioned with virtual machines (VMs). However, the…
Expand
2014
2014
An Efficient Technique for CHARACTER RECOGNITION Using Neural Network & Surf Feature Extraction
Reetika Verma
,
R. Kaur
2014
Corpus ID: 15587718
Character Recognition has been one of the active and challenging areas of research in the field of image processing and pattern…
Expand
2013
2013
DCT Based Digital Image Watermarking, De- watermarking & Authentication
Pravin M. Pithiya
2013
Corpus ID: 6199116
This paper introduces an algorithm of digital image watermarking based on Discrete Wavelet Transform (DWT). In this technique the…
Expand
2013
2013
SkypeMorph: Protocol Obfuscation for Censorship Resistance
H. M. Moghaddam
2013
Corpus ID: 38376305
The Tor network is designed to provide users with low-latency anonymous communication. Tor clients build circuits with publicly…
Expand
2013
2013
Implementation of Variable Tone Variable Bits Gray-Scale Image Stegnography Using Discrete Cosine Transform
Sahib Khan
,
M. N. Khan
,
S. Iqbal
,
Syed Yaqoob Shah
,
Nasir Ahmad
2013
Corpus ID: 119102855
Secure exchange of information is the basic need of modern digital world of e-communication which is achieved either by…
Expand
2013
2013
Medical Image Compression Technique using Listless Set Partitioning in Hierarchical Trees and Contextual Vector quantization for brain Images
S. Sridevi
,
V. Vijayakumar
Journal of Computer Science
2013
Corpus ID: 37643510
A hybrid image compression techniques has been developed to compress medical images. Due to the extensive use of medical images…
Expand