Search Results - bandwidth ((((prioritization algorithm) OR (optimization algorithm))) OR (encryption algorithm))
Search alternatives:
- prioritization algorithm »
-
1
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
2
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
3
Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks
Published 2014“…The Third contribution is an efficient bandwidth allocation algorithm for the uplink transmission called Fuzzy Adaptive Deficit Round Robin (FADRR). …”
Get full text
Get full text
Thesis -
4
Dynamic hierarchical bandwidth allocation using Russian Doll Model in EPON
Published 2023Subjects:Article -
5
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
6
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
7
A novel approach to signal encryption: improved version of conventional DSSS scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
8
A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
9
Speech coding techniques and algorithms
Published 2011Get full text
Get full text
Get full text
Book Chapter -
10
Fair bandwidth assignment in hierarchical scheduling for mobile WiMAX system
Published 2011“…Simulations result showed that the proposed algorithm optimize the overall system throughput and assigns bandwidth effectively to the different service classes while ensuring that the QoS requirements are satisfied.…”
Get full text
Get full text
Conference or Workshop Item -
11
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. …”
Get full text
Get full text
Thesis -
12
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…This thesis describes a new algorithm called “COPPA,” which is an in-band path probing algorithm for measuring the end-to-end available bandwidth of an overlay path accurately and continuously. …”
Get full text
Get full text
Thesis -
13
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2017“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Book Section -
14
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limitations of sensors (bandwidth and energy), the majority of them are symmetric key encryption schemes and some others are asymmetric encryption schemes is not recommended to be used because of high time complexity and consumption demand. …”
Get full text
Get full text
Proceeding Paper -
15
An optimized aggregate marker algorithm for bandwidth fairness improvement in classifying traffic networks
Published 2016“…This article analyses and evaluates a new time sliding window traffic marker algorithm called the Optimized time sliding window Three Colour Marker (OtswTCM). …”
Get full text
Get full text
Get full text
Article -
16
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
17
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
18
QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks
Published 2011“…To overcome these problems Quick Transport Control Protocol (QTCP) algorithm based on optimizations of HS-TCP slow start algorithm and Additive Increase and Multiplicative Decrease (AIMD) algorithm have been proposed. …”
Get full text
Get full text
Conference or Workshop Item -
19
Global priority DBA using fuzzy logic in Ethernet PON
Published 2023“…In order to fully optimize the bandwidth in upstream Ethernet passive optical network, dynamic bandwidth allocation (DBA) algorithm is used to allocate the bandwidth efficiently. …”
Conference paper -
20
Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi
Published 2012“…This thesis is concerned with algorithm optimization and efficient low cost architecture design for integer motion estimation (IME) and sub-pixel motion estimation (SME) of H.264/AVC. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
