Search Results - (( based coding protocol algorithm ) OR ( simulation optimization method algorithm ))
Search alternatives:
- protocol algorithm »
- method algorithm »
- coding protocol »
- based coding »
-
1
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…The limitation of the available works on min-sum based LDPC code decoding algorithm specifically for DF protocol relay system motivated this research. …”
Get full text
Get full text
Get full text
Thesis -
2
Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications
Published 2025“…Key topics examined include AI-enhanced adaptive data rate (ADR) methods, coding schemes based on the Chinese Remainder Theorem (CRT), and processes utilizing Variable Order Hidden Markov Models (VHMM). …”
Get full text
Get full text
Get full text
Article -
3
Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology
Published 2022“…It is constructed using coding theory-based hardness assumptions. Since code-based hardness assumptions are the foundation of code-based cryptography, thus, we first investigate various code-based hard problems. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. …”
Get full text
Get full text
Get full text
Article -
5
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…Station-to-Station protocol is a protocol based on the Diffie-Hellman key exchange to prevent the man-in-the-middle attack by inserting authentication. …”
Get full text
Get full text
Student Project -
7
-
8
-
9
-
10
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
Get full text
Get full text
Thesis -
12
Evolutionary algorithm based network coding for optmization of intelligent vehicular ad hoc network
Published 2017“…This project aims to improve the throughput, energy consumption and overhead of vehicular ad hoc network (VANET) by optimising the network coding (NC) using Genetic Algorithm and Particle Swarm Optimisation (GA-PSO). …”
Get full text
Get full text
Thesis -
13
Optimal forwarding routing protocol in ipv6-based wireless sensor network
Published 2009“…Currently, a popular routing network protocol in WSNs is not compatible with IP-Based network _and can not provide Internet connection. …”
Get full text
Get full text
Thesis -
14
Optimization of turning parameters using genetic algorithm method
Published 2008“…The simulation based on Genetic Algorithm are successful develop and the optimum parameters values are obtained from the simulation.…”
Get full text
Get full text
Undergraduates Project Papers -
15
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…This thesis proposes and simulates the three novel optimization algorithms to handle DG allocation, different single-objective, and multi-objective OPF problems. …”
Get full text
Get full text
Thesis -
18
A discrete simulated kalman filter optimizer for combinatorial optimization problems
Published 2022“…An example of a numerical algorithm is the simulated Kalman filter (SKF). Various method has been introduced as an extension of a numerical algorithm to adapt it to a discrete search space. …”
Get full text
Get full text
Thesis -
19
Route optimization using shortest path method / Muhamad Faisal Amin Shakri
Published 2025“…Therefore, the effectiveness of route planning is very essential. The method to study route optimization is called shortest path method. …”
Get full text
Get full text
Thesis -
20
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…For EL video packets, an enhanced routing algorithm was proposed to route the Enhance Layer (EL) packets, namely, Energy Sensible and Route Stability Based Routing Protocol (ESRSBRP) which is used over Mobile network. …”
Get full text
Get full text
Get full text
Thesis
