Search Results - bandwidth ((((maximization algorithm) OR (optimization algorithm))) OR (encryption algorithm))
Search alternatives:
-
1
Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt
Published 2021“…The existing techniques (HS and its variants) have issues in terms of searching strategy (exploration and exploitation), slow convergence rate and high computation time for solving the scheduling problems maximally or near to optimal one. Therefore, a tasks distribution in driver scheduling using dynamic set of bandwidth in harmony search algorithm with 2-opt (SBHS2-opt) was proposed in this research. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…In the following study, the radio bandwidth's energy consumption is the target under study, which in turn is predicted to optimize WSN.…”
Article -
3
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
4
Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks
Published 2014“…The Third contribution is an efficient bandwidth allocation algorithm for the uplink transmission called Fuzzy Adaptive Deficit Round Robin (FADRR). …”
Get full text
Get full text
Thesis -
5
Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks
Published 2012“…In addition, it is able to provide provision which are extended for QoS support. The Dynamic Based Bandwidth Reservation (DBBR) algorithm is designed to ensure that fair bandwidth access for both upstream and downstream nodes are achieved. …”
Get full text
Get full text
Thesis -
6
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
7
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…The algorithm is based on the idea of the optimization problem in which resource allocation problem is formulated as an optimization problem. …”
Get full text
Get full text
Thesis -
8
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
9
Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris
Published 2017“…This research proposed an optimal downlink scheduling algorithm called Video Real-Time Scheduling Algorithm (VRTSA) to support real-time traffic of video in LTE network. …”
Get full text
Get full text
Get full text
Thesis -
10
Load balancing and congestion control in ATM using fuzzy logic and spiking neuron network / Tan Jiann Shin
Published 2005“…It has the flexibility to maximize solution space by recording details of all candidate routes for optimal route selection [37]. …”
Get full text
Get full text
Thesis -
11
A femtocell cross-tier interference mitigation technique in OFDMA-LTE system: a cuckoo search based approach
Published 2016“…Cuckoo search Algorithm is extensively employed to successfully address the problem of resource optimization by finding and allocating the suitable power and bandwidth for all the users and this ultimately, leads to mitigating the cross-tier interference for OFDMA macro-femtocell networks. …”
Get full text
Get full text
Article -
12
Efficient relay placement algorithm using landscape aware routing (erpalar)
Published 2011“…ERP ALAR was implemented in Matlab R2009a using Genetic Algorithm (GA) with multi-objectives. GA is an optimization algorithm that simulates natural selection process as found in nature. …”
Get full text
Get full text
Thesis -
13
Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems
Published 2015“…Therefore, the aim of this thesis is to optimize the energy and bandwidth resources while maintaining QoS at the downlink when a partial feedback is considered. …”
Get full text
Get full text
Thesis -
14
-
15
Network calculus-based latency for time-triggered traffic under Flexible Window-Overlapping Scheduling (FWOS) in a Time-Sensitive Network (TSN)
Published 2021“…While guaranteeing latency deadline for TT traffic, the FWOS algorithm defines the maximum allowable OR that maximizes the bandwidth available for unscheduled transmission. …”
Get full text
Get full text
Article -
16
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
17
Traffic Control in a Synchronous Transfer Mode Networks
Published 1995“…Based on this scenario, various charge classes and booking policies are introduced. An effective bandwidth allocation scheme is proposed at the VP level with multiple nested charge classes where these various classes are allocated bandwidth optimally through some booking policies'. …”
Get full text
Get full text
Thesis -
18
A novel approach to signal encryption: improved version of conventional DSSS scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
19
A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
20
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis
