Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,480,300 papers from all fields of science
Search
Sign In
Create Free Account
BitTorrent protocol encryption
Known as:
Bittorrent encryption
, MSE/PE
, Message Stream Encryption
Expand
Protocol encryption (PE), message stream encryption (MSE) or protocol header encrypt (PHE) are related features of some peer-to-peer file-sharing…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
BitComet
BitTorrent (software)
Confidentiality
Disintermediation
Expand
Broader (1)
BitTorrent
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
IMPROVEMENT OF IMAGE APPLYING FUZZY LOGIC
Dr. Akanksha Mishra
,
Aadrika Gupta
,
Ankita Mahaver
2017
Corpus ID: 212486419
This paper presents an idea for improvement of image through super resoluting it, by using a set of Fuzzy Logic Rules. The logic…
Expand
2017
2017
An Improved JPEG Image Compression Algorithm by Modifying Luminance Quantization Table
Pranab Lamia Alam1
,
Kumar Dhar1
,
Mirza A. F. M. Rashidul Hasan2
,
Mohammed Golam
,
Sarwar Bhuyan3
,
Golam Moktader Daiyan4
2017
Corpus ID: 212455937
Summary JPEG has been widely used for lossy image compression. In this paper, we introduce an improved JPEG compression algorithm…
Expand
2016
2016
Clinical assessment of injured ankle ATFL ligaments based on ultrasound imaging in the athletes
Vedpal Singh
,
I. Elamvazuthi
,
V. Jeoti
,
J. George
,
Dileep Kumar
International Conference on Intelligent and…
2016
Corpus ID: 15130070
Ultrasound image segmentation is still a challenging issue in various applications to extract the meaningful information for…
Expand
2015
2015
Denoising EEG Signal Using Wavelet Transform
R. Princy
,
P. Thamarai
2015
Corpus ID: 30936540
Electroencephalogram (EEG) signal is the recording of spontaneous electrical activity of the brain over a small interval of time…
Expand
2015
2015
Color image steganography technique using daubechies discrete wavelet transform
A. Shrestha
,
A. Timalsina
International Conference on Software, Knowledge…
2015
Corpus ID: 10728752
The world in modern days is being more and more tied up to the use of technology for facilitating day to day tasks. In this…
Expand
2015
2015
A High-accuracy Self-adaptive Resource Demands Predicting Method in IaaS Cloud Environment
Zhijia Chen
,
Yuanchang Zhu
,
Yanqiang Di
,
Shaochong Feng
,
Jingtao Geng
2015
Corpus ID: 28634133
In IaaS (Infrastructure as a Service) cloud environment, users are provisioned with virtual machines (VMs). However, the…
Expand
2013
2013
DCT Based Digital Image Watermarking, De- watermarking & Authentication
Pravin M. Pithiya
2013
Corpus ID: 6199116
This paper introduces an algorithm of digital image watermarking based on Discrete Wavelet Transform (DWT). In this technique the…
Expand
2012
2012
Edge detection of color image using vector morphological operators
Lei Wang
,
Lingbo Yan
Proceedings of 2nd International Conference on…
2012
Corpus ID: 14803112
In order to overcome the drawback which the traditional edge detection methods have high sensitivities to noise, a new edge…
Expand
2011
2011
Performance Analysis of Distributed Incremental LMS Algorithm with Noisy Links
A. Khalili
,
M. Tinati
,
A. Rastegarnia
Int. J. Distributed Sens. Networks
2011
Corpus ID: 30922684
Recently proposed distributed adaptive estimation algorithms for wireless sensor networks (WSNs) do not consider errors due to…
Expand
2009
2009
Adaptive data hiding scheme for medical images using integer wavelet transform
Nisar Ahmed Memon
,
S. Gilani
International Conference on Emerging Technologies
2009
Corpus ID: 8030935
Digital medical images are very easy to be modified for illegal purposes. For example malignant nodules on lung parenchyma in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required