Search Results - bandwidth ((estimation algorithm) OR (((evolution algorithm) OR (encryption algorithm))))

Refine Results
  1. 1

    Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms by Alswaitti, Mohammed Y. T.

    Published 2018
    “…Moreover, the balance between the exploration and exploitation processes in the DPSO framework is considered using a combination of (i) a kernel density estimation technique associated with new bandwidth estimation method and (ii) estimated multi-dimensional gravitational learning coefficients. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A novel LTE scheduling algorithm for green technology in smart grid by Hindia, M.N., Reza, A.W., Noordin, K.A., Chayon, M.H.R.

    Published 2015
    “…In this paper, three SG applications applicable to renewable energy system, namely, distribution automation (DA), distributed energy system-storage (DER) and electrical vehicle (EV), are investigated in order to study their suitability in Long Term Evolution (LTE) network. To compensate the weakness in the existing scheduling algorithms, a novel bandwidth estimation and allocation technique and a new scheduling algorithm are proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Enhanced chaotic image encryption algorithm based on Baker's map by Salleh, Mazleena, Ibrahim, Subariah, lsnin, Fauz

    Published 2003
    “…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
    Get full text
    Get full text
    Article
  4. 4

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…These algorithms can improve mobile stations’ quality of service as well as guarantee seamless mobility across the Long-Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) technologies. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Current Developments In Lte/Lte-Advanced : Adaptive-Proportional Fair Scheduling In Lte by Ismail, Mohd Khairy, Awang Md Isa, Azmi, Johal, Mohammad Syahrir, Mohd Zin, Mohd Shahril Izuan

    Published 2015
    “…The proportional fair scheduling (PFS) algorithm is mainly focused on bandwidth allocation criterion in LTE networks for supporting high resource utilization while maintaining high fairness among network flows to each distributed User Equipment (UE). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A novel approach to signal encryption: improved version of conventional DSSS scheme by Mohd Abdur, Rashid, Saiful Bahri, Mohamed, A., Hiral, N., Sakibr

    Published 2011
    “…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
    Get full text
    Get full text
    Article
  9. 9

    A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme by -, Mohd Abdur Rashid, Mohamed, Saiful Bahri, -, A. Hiral, -, N. Sakibr

    Published 2011
    “…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
    Get full text
    Get full text
    Article
  10. 10

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Active measurement techniques performed by overlay nodes can provide bandwidth estimations of an end-to-end overlay path. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Performance of maximum-largest weighted delay first algorithm in long term evolution-advanced with carrier aggregation by Mohd. Ramli, Huda Adibah

    Published 2014
    “…Long Term Evolution-Advanced (LTE-A) that supports a wider transmission bandwidth is expected to meet this crucial demand. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi by Hosseiny Fatemi, Mohammad Reza

    Published 2012
    “…This thesis is concerned with algorithm optimization and efficient low cost architecture design for integer motion estimation (IME) and sub-pixel motion estimation (SME) of H.264/AVC. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi by Azmi, Aini

    Published 2016
    “…Performance shows the bandwidth controlled as bandwidth save, processing time, bucket capacity and cost. …”
    Get full text
    Get full text
    Article
  17. 17

    Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi by Azmi, Aini

    Published 2016
    “…Performance shows the bandwidth controlled as bandwidth save, processing time, bucket capacity and cost. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Article
  19. 19

    An improved component carrier selection algorithm for downlink long term evolution advanced by Mohd. Ramli, Huda Adibah, Mohd. Isa, Farah Nadia, Asnawi, Ani Liza

    Published 2014
    “…Long Term Evolution-Advanced (LTE-A) supports much wider transmission bandwidth through Carrier Aggregation (CA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limitations of sensors (bandwidth and energy), the majority of them are symmetric key encryption schemes and some others are asymmetric encryption schemes is not recommended to be used because of high time complexity and consumption demand. …”
    Get full text
    Get full text
    Proceeding Paper