Search Results - (( bandwidth evolution algorithm ) OR ( bandwidth encryption algorithm ))

Search alternatives:

Refine Results
  1. 1

    Enhanced chaotic image encryption algorithm based on Baker's map by Salleh, Mazleena, Ibrahim, Subariah, lsnin, Fauz

    Published 2003
    “…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
    Get full text
    Get full text
    Article
  2. 2

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    A novel approach to signal encryption: improved version of conventional DSSS scheme by Mohd Abdur, Rashid, Saiful Bahri, Mohamed, A., Hiral, N., Sakibr

    Published 2011
    “…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
    Get full text
    Get full text
    Article
  4. 4

    A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme by -, Mohd Abdur Rashid, Mohamed, Saiful Bahri, -, A. Hiral, -, N. Sakibr

    Published 2011
    “…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Performance of maximum-largest weighted delay first algorithm in long term evolution-advanced with carrier aggregation by Mohd. Ramli, Huda Adibah

    Published 2014
    “…Long Term Evolution-Advanced (LTE-A) that supports a wider transmission bandwidth is expected to meet this crucial demand. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    An improved component carrier selection algorithm for downlink long term evolution advanced by Mohd. Ramli, Huda Adibah, Mohd. Isa, Farah Nadia, Asnawi, Ani Liza

    Published 2014
    “…Long Term Evolution-Advanced (LTE-A) supports much wider transmission bandwidth through Carrier Aggregation (CA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limitations of sensors (bandwidth and energy), the majority of them are symmetric key encryption schemes and some others are asymmetric encryption schemes is not recommended to be used because of high time complexity and consumption demand. …”
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Development of a novel component carrier selection algorithm in long term evolution-advanced (LTE-A) with carrier aggregation by Al Katsha, Mhd Zaher, Mohd. Ramli, Huda Adibah

    Published 2017
    “…Carrier Aggregation (CA), which is a method that aggregates multiple Component Carriers (CCs) of the same or different frequency bands, is one of the Long Term Evolution-Advanced (LTE-Advanced) key features. It allows the LTE-Advanced to support wider transmission bandwidth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Fair scheduling algorithm in LTE-advanced networks by Al-Shibly, Mohammed Abuljawad M, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Chebil, Jalel, Zyoud, Alhareth, Alfaqawi, Mohammed I M

    Published 2015
    “…The Long Term Evolution Advanced (LTE-Advanced) transmission bandwidth can be expanded by Carrier Aggregation (CA), where CA technology expands effective bandwidth supported to User Equipment (UE) by utilizing of radio resources across multiple carriers. …”
    Get full text
    Get full text
    Article
  13. 13

    Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced by Ahmed-Abdulazeez, Mariam Ovayioza

    Published 2018
    “…The HHPO and the MC-HOD algorithms achieves significant enhancement compared to the conventional and other algorithms examined. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Investigations of component carrier selection algorithms in long term evolution-advanced by Mohd Ramli, Huda Adibah, Asnawi, Ani Liza, Mohd. Isa, Farah Nadia, Azman, Amelia Wong, Mansor, Mohamad Ismat Hafizi

    Published 2018
    “…Given that the demand for real-time multimedia contents that require significantly high data rate are getting of high popularity, a new mobile cellular technology known as Long term Evolution-Advanced (LTE-A) was standardized. The LTE-A is envisaged to support high peak data rate by aggregating more than one Component Carriers (CCs) of the same or different frequency bandwidths. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Development of security in wireless sensor network using IPv6 by Jayapal, Vikneswary

    Published 2009
    “…The research proposed XOR encryption algorithm that possesses built-in and enhanced security measure. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks by Sanni, Mistura Laide, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina, Anwar, Farhat, Ahmed, Gharib Subhi Mahmoud

    Published 2015
    “…Thus this paper proposes a Differential Evolution based optimized mobile multicast routing algorithm for the shared tree architecture. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    A survey of component carrier selection algorithms for carrier aggregation in long term evolution-advanced by Mohd. Ramli, Huda Adibah, Asnawi, Ani Liza, Mohd. Isa, Farah Nadia, Azman, Amelia Wong

    Published 2017
    “…Given that the demand for real-time multimedia contents that require significantly high data rate are getting of high popularity, a new mobile cellular technology known as Long term Evolution-Advanced (LTE-A) was standardized. The LTE-A is envisaged to support high peak data rate by aggregating more than one contiguous or non-contiguous Component Carriers (CCs) of the same or different frequency bandwidths. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    An enhanced packet scheduling algorithm for the downlink cognitive long term evolution-advanced by Mohd Ramli, Huda Adibah, Mansor, Mohamad Ismat Hafizi

    Published 2020
    “…This enables the LTE-A to further expand the available bandwidth for packet transmission. The EM-LWDF algorithm decides the priority of each user on the basis of the desired QoS of each packet, the urgency of each packet, channel quality and the average throughput. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…Substantial simulations have been extensively carried out to evaluate the performance of the proposed algorithms compared with the existing RRM algorithms. …”
    Get full text
    Get full text
    Thesis