Search Results - bandwidth ((((evolution algorithm) OR (detection algorithm))) OR (selection algorithm))
Search alternatives:
- evolution algorithm »
-
1
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
2
Development of a novel component carrier selection algorithm in long term evolution-advanced (LTE-A) with carrier aggregation
Published 2017“…It was shown via simulation that the proposed algorithm can significantly improve the downlink LTE-Advanced performance as compared to the conventional CC selection algorithms.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
An improved component carrier selection algorithm for downlink long term evolution advanced
Published 2014“…Given that there are multiple CCs available, an efficient CC selection algorithm is necessary in order to assign a CC to each LTE user. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Investigations of component carrier selection algorithms in long term evolution-advanced
Published 2018“…Since the inter-band non-contiguous carrier aggregation is likely to be used due to the current frequency allocation, this paper provides a performance study of a number of CC selection algorithms for use in the inter-band non-contiguous downlink LTE-A. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
A survey of component carrier selection algorithms for carrier aggregation in long term evolution-advanced
Published 2017“…It can be concluded from the study that the CC selection algorithms for newly-arrived LTE users can benefit from the channel diversity and the load status whereas the carrier aggregation that does not allocate all of the available CCs to the newly arrived LTE-A users shown to be more efficient.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced
Published 2018“…But issues related to non-optimal algorithm for selecting the appropriate Handover Control Parameters (HCPs) needs further attention. …”
Get full text
Get full text
Thesis -
7
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…More importantly, integrating the marker with scheduler algorithms in order to reduce the traffic loss and improve bandwidth fairness. …”
Get full text
Get full text
Thesis -
8
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…Then, a multi criteria with two-threshold algorithm is proposed to prioritize the selection between the LTE and WiMAX as target technologies. …”
Get full text
Get full text
Thesis -
9
Differential evolution optimization for constrained routing in Wireless Mesh Networks
Published 2014“…However, this problem is NP-complete, hence, this paper proposes fast convergent Differential Evolution metaheuristic algorithm with bandwidth and delay constraints for minimum routing cost. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
From sensing to predictions and database technique: a review of TV white space information acquisition in cognitive radio networks
Published 2017“…Strategies to acquire white space information is the single most significant functionality in cognitive radio networks (CRNs) and as such, it has gone some evolution to enhance information accuracy. The evolution trends are spectrum sensing, prediction algorithm and recently, geo-location database technique. …”
Get full text
Get full text
Get full text
Article -
11
GA-based feature subset selection in a spam/non-spam detection system
Published 2012“…In this paper, a genetic algorithm (GA) is applied during feature selection in effort to decrease the number of useless features in a collection of high-dimensional email body and subject. …”
Get full text
Get full text
Conference or Workshop Item -
12
Packet scheduling algorithms for long term evolution
Published 2011Get full text
Get full text
Get full text
Book Chapter -
13
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…Finally, the algorithm Void Avoidance Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with the communication void by introducing a simple method to detect a void node and avoid it during the forwarding process. …”
Get full text
Get full text
Thesis -
14
Performance of maximum-largest weighted delay first algorithm in long term evolution-advanced with carrier aggregation
Published 2014“…Long Term Evolution-Advanced (LTE-A) that supports a wider transmission bandwidth is expected to meet this crucial demand. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
Published 2014“…This paper proposes a scheduling algorithm for RAT selection in HWN for bandwidth aggregation. …”
Get full text
Get full text
Proceeding Paper -
16
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…Through effective separation of benign from harmful packet flows, this method lessens the burden on the control plane while preserving communication bandwidth. The results of the tests indicated increased performance in terms of fewer false positives, less CPU utilisation, less control channel bandwidth used, higher packet delivery ratio, and fewer flow requests made to the controller with 99.56% detection accuracy as compared to selected benchmarks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Such an in-band probing algorithm reduces measurement overhead on the selected overlay path. …”
Get full text
Get full text
Thesis -
18
Systematic review of intrusion detection system based on machine learning techniques for internet of things
Published 2023“…We highlighted the most efficient machine learning algorithms and feature selection techniques, along with strategies to address issues related to dataset imbalance in benchmarked datasets, with the goal of fostering the development of robust IDS solutions for IoT security.…”
Get full text
Get full text
Article -
19
Development of new code for optical code division multiple access systems
Published 2011“…To overcome the stated problems, RD code families are used throughout this stage. Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
Get full text
Thesis -
20
Fair scheduling algorithm in LTE-advanced networks
Published 2015“…The Long Term Evolution Advanced (LTE-Advanced) transmission bandwidth can be expanded by Carrier Aggregation (CA), where CA technology expands effective bandwidth supported to User Equipment (UE) by utilizing of radio resources across multiple carriers. …”
Get full text
Get full text
Article
