Search Results - bandwidth ((((maximization algorithm) OR (optimization algorithm))) OR (encryption algorithm))

Refine Results
  1. 1

    Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt by Shaffiei, Zatul Alwani

    Published 2021
    “…The existing techniques (HS and its variants) have issues in terms of searching strategy (exploration and exploitation), slow convergence rate and high computation time for solving the scheduling problems maximally or near to optimal one. Therefore, a tasks distribution in driver scheduling using dynamic set of bandwidth in harmony search algorithm with 2-opt (SBHS2-opt) was proposed in this research. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks by Ismail Abdullah, Kalid Abdlkader Marsal

    Published 2024
    “…In the following study, the radio bandwidth's energy consumption is the target under study, which in turn is predicted to optimize WSN.…”
    Article
  3. 3

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks by Alsahag, Ali Mohamemed Mansor

    Published 2014
    “…The Third contribution is an efficient bandwidth allocation algorithm for the uplink transmission called Fuzzy Adaptive Deficit Round Robin (FADRR). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…In addition, it is able to provide provision which are extended for QoS support. The Dynamic Based Bandwidth Reservation (DBBR) algorithm is designed to ensure that fair bandwidth access for both upstream and downstream nodes are achieved. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…The algorithm is based on the idea of the optimization problem in which resource allocation problem is formulated as an optimization problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhanced chaotic image encryption algorithm based on Baker's map by Salleh, Mazleena, Ibrahim, Subariah, lsnin, Fauz

    Published 2003
    “…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
    Get full text
    Get full text
    Article
  9. 9

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…This research proposed an optimal downlink scheduling algorithm called Video Real-Time Scheduling Algorithm (VRTSA) to support real-time traffic of video in LTE network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Load balancing and congestion control in ATM using fuzzy logic and spiking neuron network / Tan Jiann Shin by Tan, Jiann Shin

    Published 2005
    “…It has the flexibility to maximize solution space by recording details of all candidate routes for optimal route selection [37]. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A femtocell cross-tier interference mitigation technique in OFDMA-LTE system: a cuckoo search based approach by Al-omari, Motea, Ramli, Abd Rahman, Sali, A., Azmir, Raja Syamsul

    Published 2016
    “…Cuckoo search Algorithm is extensively employed to successfully address the problem of resource optimization by finding and allocating the suitable power and bandwidth for all the users and this ultimately, leads to mitigating the cross-tier interference for OFDMA macro-femtocell networks. …”
    Get full text
    Get full text
    Article
  12. 12

    Efficient relay placement algorithm using landscape aware routing (erpalar) by Onabajo, Olawale Olusegun

    Published 2011
    “…ERP ALAR was implemented in Matlab R2009a using Genetic Algorithm (GA) with multi-objectives. GA is an optimization algorithm that simulates natural selection process as found in nature. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems by Salman, Mustafa Ismael

    Published 2015
    “…Therefore, the aim of this thesis is to optimize the energy and bandwidth resources while maintaining QoS at the downlink when a partial feedback is considered. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Network calculus-based latency for time-triggered traffic under Flexible Window-Overlapping Scheduling (FWOS) in a Time-Sensitive Network (TSN) by Shalghum, Khaled M., Noordin, Nor Kamariah, Sali, Aduwati, Hashim, Fazirulhisyam

    Published 2021
    “…While guaranteeing latency deadline for TT traffic, the FWOS algorithm defines the maximum allowable OR that maximizes the bandwidth available for unscheduled transmission. …”
    Get full text
    Get full text
    Article
  16. 16

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Traffic Control in a Synchronous Transfer Mode Networks by Khalil, Ibrahim

    Published 1995
    “…Based on this scenario, various charge classes and booking policies are introduced. An effective bandwidth allocation scheme is proposed at the VP level with multiple nested charge classes where these various classes are allocated bandwidth optimally through some booking policies'. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A novel approach to signal encryption: improved version of conventional DSSS scheme by Mohd Abdur, Rashid, Saiful Bahri, Mohamed, A., Hiral, N., Sakibr

    Published 2011
    “…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
    Get full text
    Get full text
    Article
  19. 19

    A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme by -, Mohd Abdur Rashid, Mohamed, Saiful Bahri, -, A. Hiral, -, N. Sakibr

    Published 2011
    “…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
    Get full text
    Get full text
    Article
  20. 20

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis