Search Results - (( java implication tree algorithm ) OR ( based communication issues algorithm ))
Search alternatives:
- communication issues »
- based communication »
- java implication »
- implication tree »
- issues algorithm »
- tree algorithm »
-
1
Cluster optimization in VANET using MFO algorithm and K-Means clustering
Published 2023“…Introduce MFO algorithm for simulate the movement behavior of moths and update the position based upon movements. …”
Get full text
Get full text
Conference or Workshop Item -
2
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
Published 2016“…To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. …”
Get full text
Get full text
Article -
3
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…In order to handle these issues, a trustworthy lightweight security scheme that allows multihop secure communication is designed that is called as Trust Based Lightweight Security Protocol in multihop D2D communication (TLwS). …”
Get full text
Get full text
Thesis -
4
Synaptogenesis based bio-inspired NoC fault tolerant interconnects
Published 2013“…In this paper a synaptogenesis bases bio-inspired algorithm is proposed for NoC. …”
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network
Published 2014“…In mobile multihop relay (MMR) networks, Relay multicast rekeying algorithm (RMRA) is meant to ensure secure multicast communication and selective updating of keys in MMR networks. …”
Get full text
Get full text
Get full text
Article -
7
Synaptogenesis based bio-inspired NoC fault tolerant interconnects
Published 2013“…In this paper a synaptogenesis bases bio-inspired algorithm is proposed for NoC. …”
Get full text
Get full text
Conference or Workshop Item -
8
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…CP-ABE algorithm is one-to-many technique suitable for secure grouping communication, but this algorithm is not a lightweight feature. …”
Get full text
Get full text
Get full text
Article -
9
Scalable rekeying algorithm in IEEE 802.16e
Published 2011“…This paper proposes a Scalable Rekeying Algorithm (SRA) based on a complete binary tree structure. …”
Get full text
Get full text
Conference or Workshop Item -
10
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
Get full text
Get full text
Thesis -
11
-
12
Investigation of gateway placement optimization approaches in wireless mesh networks using genetic algorithms
Published 2014“…In this paper, we study and investigate the efforts of many researchers that dealt with the gateway placement optimization problem based on combinatorial optimization concepts in comparison with other conventional algorithms as well as comparing the combinatorial based algorithms with each other. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
Design and development of the network interface, packets scheduling and interference mitigation schemes for LTE-based femtocell networks / Sinan Ghassan Abid Ali
Published 2016“…The proposed RBP scheduling algorithm outperforms the well-known scheduling algorithms in terms of a lower PLR among users in the LTE based femtocell network. …”
Get full text
Get full text
Thesis -
15
Scalable rekeying algorithm in IEEE 802.16e
Published 2011“…This paper proposes a Scalable Rekeying Algorithm (SRA) based on a complete binary tree structure. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
Get full text
Get full text
Thesis -
18
Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX.
Published 2013Get full text
Get full text
Article -
19
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network
Published 2022“…To tackle these issues, a lightweight multifactor authentication scheme that allows multihop secure communication over open channel is designed called as Lightweight ECC based Multifactor Authentication Protocol (LEMAP) in multihop D2D communication. …”
Get full text
Get full text
Thesis -
20
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023“…This work is focused on the implementation of evolutionary based computer algorithms, genetic algorithms (GAs), on microcontrollers. …”
Conference paper
