Search Results - (( device communication issues algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- device communication »
- communication issues »
- issues algorithm »
- java simulation »
-
1
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…This concept of multihop D2D communication has introduced a number of issues that were non-prevalent in current cellular communication. …”
Get full text
Get full text
Thesis -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
3
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
4
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
5
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. CP-ABE algorithm is one-to-many technique suitable for secure grouping communication, but this algorithm is not a lightweight feature. …”
Get full text
Get full text
Get full text
Article -
6
Performance analysis of constrained device virtualization algorithm
Published 2020“…Due to their limited capabilities, the constrained devices usually host proprietary protocols, platforms, data formats and data structures for communications and therefore, are unable to communicate with devices from different vendors. …”
Get full text
Get full text
Get full text
Article -
7
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network
Published 2022“…Another issue is that how devices can get secure mutual authentication for secure communication. …”
Get full text
Get full text
Thesis -
8
Fair and fit resource allocation algorithm for network-controlled device-to-device (D2D) communication / Yusmardiah Yusuf, Darmawaty Mohd. Ali and Roslina Mohamad
Published 2021“…Device-to-device (D2D) communication is a promising new feature for next generation cellular networks. …”
Get full text
Get full text
Get full text
Article -
9
Enhannced sampling algorithm in bluetooth low energy for indoor localization
Published 2018“…Therefore, this project enhanced the Delta Sampling algorithm in order to mitigate this issues and through the experiments, it is proven that the proposed algorithm able to stabilize the signal while solving the sample size and number of invalid samples issue.…”
Get full text
Get full text
Thesis -
10
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
11
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
Get full text
Get full text
Thesis -
12
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
14
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Understanding and comparing algorithms implemented in IoT devices, regarding performance discussed in this paper. …”
Get full text
Get full text
Article -
15
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
16
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…At the end of this research, we will provide a device heterogeneity detection algorithm that provides accurate information in resolving the heterogeneous device detection issues.…”
Get full text
Get full text
Research Reports -
17
Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems
Published 2016“…Like other electronics devices, wireless communication systems are not immune to such imperfections. …”
Get full text
Get full text
Thesis -
18
-
19
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
20
A new compression algorithm for small data communication in wireless sensor network
Published 2017“…In this paper, we propose a new lossless compression algorithm that can handle small data communication in WSNs. …”
Get full text
Get full text
Get full text
Article
