Search Results - (( intelligence based _bs algorithm ) OR ( intelligence based rsa algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An intelligent network selection mechanism for vertical handover decision in vehicular Ad Hoc wireless networks by Fazli, Azzali

    Published 2020
    “…The AHD scheme was designed to select the best-qualified access point (AP) and base station (BS) candidates without degrading the performance of ongoing applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An efficient up-link load reduction model based on clustering in vanets by Abbas Al-Sallami, Ali Hashim

    Published 2019
    “…The aim of this thesis is to mitigate uplink load at Base-Stations (BSs) resulted from the following: first, increased number of vehicles in the urban city leads to an increase in the number of cluster head (CH) in the network while each CH required uplink channel from BS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  15. 15

    Fair uplink bandwidth allocation and latency guarantee for mobile WiMAX using fuzzy adaptive deficit round robin by Alsahag, Ali Mohammed, Mohd Ali, Borhanuddin, Noordin, Nor Kamariah, Mohamad, Hafizal

    Published 2014
    “…Using intelligent systems approach upon the traffic service class information served by the base station (BS), an adaptive deadline-based scheme is designed. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Adaptive and optimized radio resource allocation algorithms for OFDMA based networks by Saadat, Md. Nazmus

    Published 2015
    “…This thesis proposes a threshold based resource allocation that helps to schedule and grant resources intelligently to solve the problem alluded to above resulting in better overall system performance, enhancing the network experience for the users. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Energy efficient cluster head distribution in wireless sensor networks by Siew, Zhan Wei

    Published 2013
    “…The main objective of this research is to improve the cluster based wireless sensor networks lifetime by selecting appropriate cluster head (CH) via improved swarm intelligence. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An Energy-Efficient User-Centric Approach High-Capacity 5G Heterogeneous Cellular Networks by Ghaleb, Abdulziz M., Mansoor, Ali Mohammed, Ahmad, Rodina

    Published 2018
    “…In this paper, we present resource-aware energy-saving technique based on the UC model for LTE-A HetNets. We formulate an optimization problem for UC as a mixed linear integer programming (MILP) that minimizes the total power consumption (Energy Efficiency) while respecting the data rate per user and propose a low complexity iterative algorithm to user terminal (UE)-eNodeB association. …”
    Get full text
    Get full text
    Article