Search Results - bandwidth ((optimization algorithm) OR (((evolution algorithm) OR (encryption algorithm))))
Search alternatives:
- evolution algorithm »
-
1
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Thus this paper proposes a Differential Evolution based optimized mobile multicast routing algorithm for the shared tree architecture. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Performance of maximum-largest weighted delay first algorithm in long term evolution-advanced with carrier aggregation
Published 2014“…Long Term Evolution-Advanced (LTE-A) that supports a wider transmission bandwidth is expected to meet this crucial demand. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced
Published 2018“…But issues related to non-optimal algorithm for selecting the appropriate Handover Control Parameters (HCPs) needs further attention. …”
Get full text
Get full text
Thesis -
4
An improved component carrier selection algorithm for downlink long term evolution advanced
Published 2014“…Long Term Evolution-Advanced (LTE-A) supports much wider transmission bandwidth through Carrier Aggregation (CA). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…The algorithm is based on the idea of the optimization problem in which resource allocation problem is formulated as an optimization problem. …”
Get full text
Get full text
Thesis -
6
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
7
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
8
Differential evolution optimization for constrained routing in Wireless Mesh Networks
Published 2014“…However, this problem is NP-complete, hence, this paper proposes fast convergent Differential Evolution metaheuristic algorithm with bandwidth and delay constraints for minimum routing cost. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems
Published 2015“…Therefore, the aim of this thesis is to optimize the energy and bandwidth resources while maintaining QoS at the downlink when a partial feedback is considered. …”
Get full text
Get full text
Thesis -
10
Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms
Published 2018“…Hence, this research has proposed three enhanced frameworks, namely, Optimized Gravitational-based (OGC), Density-Based Particle Swarm Optimization (DPSO), and Variance-based Differential Evolution with an Optional Crossover (VDEO) frameworks for data clustering. …”
Get full text
Get full text
Thesis -
11
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
12
Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris
Published 2017“…This research proposed an optimal downlink scheduling algorithm called Video Real-Time Scheduling Algorithm (VRTSA) to support real-time traffic of video in LTE network. …”
Get full text
Get full text
Get full text
Thesis -
13
A femtocell cross-tier interference mitigation technique in OFDMA-LTE system: a cuckoo search based approach
Published 2016“…Methods/Statistical analysis: This study introduce a resource allocation technique-based cuckoo search algorithm RACSA for cross-tier interference mitigation in Orthogonal Frequency Division Multiple Access based Long Term Evolution (OFDMA-LTE) system. …”
Get full text
Get full text
Article -
14
Optimal solution to the fractional knapsack problem for LTE overload-state scheduling
Published 2016“…System performance has been evaluated in terms of loss, delay and throughput in comparison with reference algorithms.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
16
A novel approach to signal encryption: improved version of conventional DSSS scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
17
A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
18
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
19
Speech coding techniques and algorithms
Published 2011Get full text
Get full text
Get full text
Book Chapter -
20
Packet scheduling algorithms for long term evolution
Published 2011Get full text
Get full text
Get full text
Book Chapter
