Search Results - (( based coding protocol algorithm ) OR ( simulation optimization based algorithm ))
Search alternatives:
- protocol algorithm »
- coding protocol »
- based coding »
-
1
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…The limitation of the available works on min-sum based LDPC code decoding algorithm specifically for DF protocol relay system motivated this research. …”
Get full text
Get full text
Get full text
Thesis -
2
Energy-Aware Routing Hole Detection Algorithm in the Hierarchical Wireless Sensor Network
Published 2019“…Hierarchical routing optimizes energy utilization by distributing the workload among different clusters. …”
Get full text
Get full text
Get full text
Article -
3
Energy-efficient medium access control strategy for cooperative wireless networks
Published 2016“…In EAP-CMAC, the best transmission mode is selected among direct transmission, traditional cooperation and PNC-based transmission by considering the destination queue and source-destination link quality.Moreover, a joint relay selection and power allocation algorithm is proposed based on location information and the nodes residual energy that significantly improves the network lifetime and energy saving in wireless networks. …”
Get full text
Get full text
Thesis -
4
Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications
Published 2025“…Key topics examined include AI-enhanced adaptive data rate (ADR) methods, coding schemes based on the Chinese Remainder Theorem (CRT), and processes utilizing Variable Order Hidden Markov Models (VHMM). …”
Get full text
Get full text
Get full text
Article -
5
Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology
Published 2022“…It is constructed using coding theory-based hardness assumptions. Since code-based hardness assumptions are the foundation of code-based cryptography, thus, we first investigate various code-based hard problems. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. …”
Get full text
Get full text
Get full text
Article -
7
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…Station-to-Station protocol is a protocol based on the Diffie-Hellman key exchange to prevent the man-in-the-middle attack by inserting authentication. …”
Get full text
Get full text
Student Project -
9
Optimization-based simulation algorithm for predictive-reactive job-shop scheduling of reconfigurable manufacturing systems
Published 2022“…In this case, the effectiveness and reliability of RMS is increase by combining the simulation with the optimization algorithm.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Simulated Kalman Filter: A Novel Estimation-based Metaheuristic Optimization Algorithm
Published 2016“…In this paper, a new population-based metaheuristic optimization algorithm, named Simulated Kalman Filter (SKF) is introduced. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
-
13
-
14
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…In this research, two novel estimation-based metaheuristic optimization algorithms, named as Simulated Kalman Filter (SKF), and single-solution Simulated Kalman Filter (ssSKF) algorithms are introduced for global optimization problems. …”
Get full text
Get full text
Thesis -
16
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
Get full text
Get full text
Thesis -
17
Angle Modulated Simulated Kalman Filter Algorithm for Combinatorial Optimization Problems
Published 2016“…Inspired by the estimation capability of Kalman filter, we have recently introduced a novel estimation-based optimization algorithm called simulated Kalman filter (SKF). …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Evolutionary algorithm based network coding for optmization of intelligent vehicular ad hoc network
Published 2017“…This project aims to improve the throughput, energy consumption and overhead of vehicular ad hoc network (VANET) by optimising the network coding (NC) using Genetic Algorithm and Particle Swarm Optimisation (GA-PSO). …”
Get full text
Get full text
Thesis -
19
Optimal forwarding routing protocol in ipv6-based wireless sensor network
Published 2009“…Currently, a popular routing network protocol in WSNs is not compatible with IP-Based network _and can not provide Internet connection. …”
Get full text
Get full text
Thesis -
20
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis
