Search Results - bandwidth ((optimization algorithm) OR (((selection algorithm) OR (encryption algorithm))))*
Search alternatives:
- selection algorithm »
-
1
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Such an in-band probing algorithm reduces measurement overhead on the selected overlay path. …”
Get full text
Get full text
Thesis -
2
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. …”
Get full text
Get full text
Thesis -
3
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
4
Hybrid Harmony Search Algorithm with Grey Wolf Optimizer and Modified Opposition-based Learning
Published 2019“…Many variants have been developed to cope with this problem and improve algorithm performance. In this paper, a hybrid algorithm of HS with grey wolf optimizer (GWO) has been developed to solve the problem of HS parameter selection. …”
Get full text
Get full text
Get full text
Article -
5
Wideband patch antenna design using selective particle swarm optimization
Published 2012“…An application of this algorithm is developed for wideband patch antenna optimization. …”
Get full text
Get full text
Get full text
Article -
6
Holographic mode-selective launch for bandwidth enhancement in multimode fiber
Published 2011“…With rapidly growing bandwidth demands in Local Area Networks, it is imperative to support next generation speeds beyond 40Gbit/s.Various holographic optimization techniques using spatial light modulators have recently been explored for adaptive channel impulse response improvement of MMF links. …”
Get full text
Get full text
Get full text
Article -
7
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
8
Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced
Published 2018“…But issues related to non-optimal algorithm for selecting the appropriate Handover Control Parameters (HCPs) needs further attention. …”
Get full text
Get full text
Thesis -
9
A Fast Scheduling Algorithm for WDM Optical Networks
Published 2000“…Many researches have focused on the scheduling algorithms that perform this kind of coordination. This thesis proposes a scheduling algorithm for the WDM broadcast networks. …”
Get full text
Get full text
Thesis -
10
The performance effect due to varying network topologies on a software-defined network employing the k-shortest path
Published 2022“…K-shortest paths algorithm discovers a set of paths ordered in the most optimal, optimal, and suboptimal, has a very wide application is integrated into SDN controller to handle routing functionality. …”
Get full text
Get full text
Article -
11
A load-balanced algorithm for Internet Gateway placement in Backbone Wireless Mesh Networks
Published 2024“…In this paper, we propose a Load-balanced Algorithm for IGW placement in BWMN to achieve high-bandwidth network coverage while satisfying QoS constraints. …”
Get full text
Get full text
Article -
12
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Simultaneously, Cultural Algorithms (CA) will be exploited to optimize the performance of proxy caching in accumulating the knowledge between each generation. …”
Get full text
Get full text
Article -
13
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
14
An improved component carrier selection algorithm for downlink long term evolution advanced
Published 2014“…Given that there are multiple CCs available, an efficient CC selection algorithm is necessary in order to assign a CC to each LTE user. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks
Published 2022“…The second part proposes an optimized flexible window-overlapping scheduling (OFWOS) algorithm that optimizes the offset difference ( ) between the samepriority TT windows in the adjacent nodes. …”
Get full text
Get full text
Thesis -
16
ABC-PSO for vertical handover in heterogeneous wireless networks
Published 2017“…This study proposes a hybrid intelligent handover decision algorithm primarily founded on two main heuristic algorithms: Artificial Bee Colony or ABC as well as Particle Swarm Optimization or PSO named ABC-PSO to select best wireless network during vertical handover process. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Efficient relay placement algorithm using landscape aware routing (erpalar)
Published 2011“…ERP ALAR was implemented in Matlab R2009a using Genetic Algorithm (GA) with multi-objectives. GA is an optimization algorithm that simulates natural selection process as found in nature. …”
Get full text
Get full text
Thesis -
18
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
19
Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony
Published 2022“…In this project, a comparative evaluation of selected algorithms is done to ascertain their applicability, practicality, and adaptability in a cloud scenario. …”
Get full text
Get full text
Get full text
Academic Exercise -
20
A novel approach to signal encryption: improved version of conventional DSSS scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article
