default search action
K. M. S. Soyjaudah
Person information
- affiliation: University of Mauritius
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j16]Prateema Ragpot, Tulsi Pawan Fowdur, Krishnaraj Madhavjee Sunjiv Soyjaudah:
A Multi-layer UEP Scheme for VOLTE Transmission Using QAM and S-QAM. Wirel. Pers. Commun. 124(3): 2161-2190 (2022) - 2021
- [j15]Yogesh Beeharry, T. P. Fowdur, K. M. S. Soyjaudah:
On the Logical Computational Complexity Analysis of Turbo Decoding Algorithms for the LTE Standards. Wirel. Pers. Commun. 118(2): 1591-1619 (2021)
2010 – 2019
- 2019
- [j14]Prateema Ragpot, Tulsi Pawan Fowdur, Krishnaraj Madhavjee Sunjiv Soyjaudah:
Enhanced MP3 transmission over Wi-Fi and LTE networks using unequal error protection and varying frequency transforms. J. Inf. Telecommun. 3(4): 508-532 (2019) - [c30]Purvashi Baynath, K. M. S. Soyjaudah, Maleika Heenaye-Mamode Khan:
Pattern representation using Neuroevolution of the augmenting topology (NEAT) on Keystroke dynamics features in Biometrics. NextComp 2019: 1-7 - [c29]Purvashi Baynath, K. M. S. Soyjaudah, Maleika Heenaye-Mamode Khan:
Machine Learning Algorithm on Keystroke dynamics Fused pattern in biometrics. NextComp 2019: 1-6 - 2018
- [j13]Yogesh Beeharry, Tulsi Pawan Fowdur, Krishnaraj Madhavjee Sunjiv Soyjaudah:
Performance of duo-binary turbo codes with optimized hierarchical modulation. Internet Technol. Lett. 1(6) (2018) - 2017
- [c28]Seeven Amic, K. M. Sunjiv Soyjaudah, Gianeshwar Ramsawock:
Binary cat swarm optimization for cryptanalysis. ANTS 2017: 1-6 - [c27]Purvashi Baynath, K. M. Sunjiv Soyjaudah, Maleika Heenaye-Mamode Khan:
Keystroke recognition using neural network. ISCBI 2017: 86-90 - 2016
- [j12]T. P. Fowdur, Yogesh Beeharry, K. M. S. Soyjaudah:
A novel scaling and early stopping mechanism for LTE turbo code based on regression analysis. Ann. des Télécommunications 71(7-8): 369-388 (2016) - 2015
- [c26]Kanayah Saurty, Pierre Clarel Catherine, K. M. S. Soyjaudah:
A modified Rough Mode Decision process for fast High Efficiency Video Coding (HEVC) intra prediction. DICTAP 2015: 143-148 - [c25]Tulsi Pawan Fowdur, Prateema Ragpot, Sunjiv K. M. Soyjaudah:
Enhanced audio transmission over ADSL using prioritised DMT modulation and retransmissions. EUROCON 2015: 1-6 - 2014
- [c24]Tulsi Pawan Fowdur, Deevya Indoonundon, Sunjiv K. M. Soyjaudah:
An enhanced framework for H.264 video transmission with joint prioritisation of retransmission and concealment order. CSNDSP 2014: 634-639 - [c23]Tulsi Pawan Fowdur, Yogesh Beeharry, Sunjiv K. M. Soyjaudah:
Performance of modified asymmetric LTE Turbo codes with reliability-based hybrid ARQ. CSNDSP 2014: 928-933 - [c22]Kanayah Saurty, Pierre Clarel Catherine, K. M. S. Soyjaudah:
Early CU size determination in HEVC intra prediction using Average Pixel Cost. DICTAP 2014: 247-252 - 2013
- [c21]Perienen Appavoo, K. M. Sunjiv Soyjaudah, Vinaye Armoogum:
Effects of prior learning on mathematics performance at secondary level. AFRICON 2013: 1-5 - [c20]Perienen Appavoo, K. M. Sunjiv Soyjaudah, Vinaye Armoogum:
Readiness of mathematics' educators to incorporate ICT as a teaching tool in Mauritius. AFRICON 2013: 1-5 - [c19]Yogesh Beeharry, T. P. Fowdur, K. M. S. Soyjaudah:
Joint source channel decoding of circular non binary turbo codes. AFRICON 2013: 1-5 - [c18]Insah Bhurtah, Pierre Clarel Catherine, K. M. Sunjiv Soyjaudah:
Parallel concatenation of recursive systematic convolutional codes with transmission of interleaved set. AFRICON 2013: 1-5 - [c17]T. P. Fowdur, Deevya Indoonundon, K. M. S. Soyjaudah:
An unequal error protection scheme for SPIHT image transmission with prioritised retransmissions and de-noising. AFRICON 2013: 1-5 - [c16]Krishnaraj Madhavjee Sunjiv Soyjaudah, Gianeshwar Ramsawock, Muhammad Yaasir Khodabacchus:
Cloud computing authentication using cancellable biometrics. AFRICON 2013: 1-4 - [c15]Heman Mohabeer, K. M. S. Soyjaudah:
Improving the Performance of NEAT Related Algorithm via Complexity Reduction in Search Space. DCAI 2013: 1-7 - 2012
- [j11]T. P. Fowdur, K. M. S. Soyjaudah:
Highly scalable JPEG image transmission with unequal error protection and optimal feedback. Telecommun. Syst. 49(4): 355-377 (2012) - [c14]Heman Mohabeer, K. M. S. Soyjaudah:
Application of predictive coding in the evolution of artificial neural network. CogInfoCom 2012: 775-780 - [i3]M. Razvi Doomun, K. M. Sunjiv Soyjaudah:
LOTKIP: Low Overhead TKIP Optimization for Ad Hoc Wireless Network. CoRR abs/1208.2305 (2012) - [i2]M. Razvi Doomun, K. M. Sunjiv Soyjaudah:
Route Extrapolation for Source and Destination Camouflage in Wireless Ad Hoc Networks. CoRR abs/1208.5569 (2012) - [i1]M. Razvi Doomun, K. M. Sunjiv Soyjaudah:
Modified Temporal Key Integrity Protocol For Efficient Wireless Network Security. CoRR abs/1208.5571 (2012) - 2011
- [j10]T. P. Fowdur, K. M. S. Soyjaudah:
Wireless JPEG Image Transmission Using Multiple Diversity Combining and Unequal Error Protection. Wirel. Pers. Commun. 59(2): 275-296 (2011) - [c13]P. C. Catherine, K. M. S. Soyjaudah:
Erasing Bit Nodes on the Bipartite Graph for Enhanced Performance of LDPC Codes. ICETET 2011: 107-111 - [c12]P. C. Catherine, K. M. S. Soyjaudah:
Parallel Concatenation of LDPC Codes with Two Sets of Source Bits. ICETET 2011: 112-115 - 2010
- [j9]Tulsi Pawan Fowdur, Sunjiv K. M. Soyjaudah:
Hybrid Joint Source Channel Decoding for Progressive JPEG Image Transmission. Circuits Syst. Signal Process. 29(5): 857-879 (2010) - [c11]M. Razvi Doomun, K. M. Sunjiv Soyjaudah:
Route Extrapolation for Source and Destination Camouflage in Wireless Ad Hoc Networks. ICCCN 2010: 1-7
2000 – 2009
- 2009
- [j8]M. Razvi Doomun, K. M. S. Soyjaudah:
Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security. Int. J. Netw. Secur. 9(1): 82-94 (2009) - [j7]T. P. Fowdur, K. M. S. Soyjaudah:
Joint source channel decoding and iterative symbol combining with turbo trellis-coded modulation. Signal Process. 89(4): 570-582 (2009) - 2008
- [j6]T. P. Fowdur, K. M. S. Soyjaudah:
Performance of joint source-channel decoding with iterative bit combining and detection. Ann. des Télécommunications 63(7-8): 409-423 (2008) - [j5]T. P. Fowdur, K. M. S. Soyjaudah:
Robust JPEG image transmission using unequal error protection and code combining. Int. J. Commun. Syst. 21(1): 1-24 (2008) - [j4]K. M. S. Soyjaudah, P. C. Catherine:
Efficient Recovery Technique for Low-Density Parity-Check Codes Using Reduced-Set Decoding. J. Circuits Syst. Comput. 17(2): 333-351 (2008) - [c10]Narainsamy Pavaday, K. M. S. Soyjaudah:
A comparative study of secret code variants in terms of keystroke dynamics. CRiSIS 2008: 133-140 - [c9]Visham Ramsurrun, K. M. Sunjiv Soyjaudah:
A Highly Available Transparent Linux Cluster Security Model. IPCCC 2008: 69-76 - 2007
- [c8]Vinaye Armoogum, K. M. S. Soyjaudah, Nawaz Mohamudally, Terence C. Fogarty:
Comparative Study of Path Loss Using Existing Models for Digital Television Broadcasting for Summer Season in the North of Mauritius. AICT 2007: 34 - [c7]Vinaye Armoogum, K. M. S. Soyjaudah, A. Jugurnauth, Nawaz Mohamudally, Terence C. Fogarty:
Adjacent Channel Interference for DVB-T at UHF Bands in the South of Mauritius for Summer Season. AICT 2007: 36 - [c6]M. Razvi Doomun, K. M. S. Soyjaudah:
Adaptive IEEE 802.11i Security for Energy-Security Optimization. AICT 2007: 38 - [c5]M. Razvi Doomun, K. M. Sunjiv Soyjaudah:
Modified Temporal Key Integrity Protocol for Efficient Wireless Network Security. SECRYPT 2007: 151-156 - 2006
- [j3]K. M. S. Soyjaudah, T. P. Fowdur:
Critical Analysis of a Combined Huffman and convolutional Coding Scheme. J. Circuits Syst. Comput. 15(4): 641-657 (2006) - [c4]K. M. S. Soyjaudah, T. P. Fowdur:
An Integrated Unequal Error Protection Scheme for the Transmission of Compressed Images with ARQ. ICN/ICONS/MCL 2006: 103 - [c3]Mussawir Ahmad Hosany, K. M. S. Soyjaudah:
Statistical Time Channel Evaluation of Array Codes in Block Coded Phase. ICN/ICONS/MCL 2006: 157 - [c2]Mussawir Ahmad Hosany, K. M. S. Soyjaudah:
A Complexity Study of Joint and Separate Huffman with Array Codes. ICN/ICONS/MCL 2006: 159 - [c1]Mussawir Ahmad Hosany, K. M. S. Soyjaudah:
Joint Variable Length Source Codes and Convolutional Codes for Text. ICN/ICONS/MCL 2006: 160 - 2003
- [j2]K. M. S. Soyjaudah, Mussawir Ahmad Hosany:
Combined Huffman Code and Generalized Array Codes Employing Phase/Frequency Modulation. J. Circuits Syst. Comput. 12(1): 93-110 (2003)
1990 – 1999
- 1999
- [j1]K. M. S. Soyjaudah, M. I. Jahmeerbacus:
Novel Embedded Coding Technique Using Array Codes and Statistical Channel Evaluation. J. Circuits Syst. Comput. 9(5-6): 307-319 (1999)
Coauthor Index
aka: T. P. Fowdur
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint