Search Results - (( evolution optimization steam algorithm ) OR ( _ communications tree algorithm ))

Refine Results
  1. 1
  2. 2

    Dynamic tree-splitting algorithm for massive random access of M2M communications in IoT networks by Althumali, Huda, Othman, Mohamed, Noordin, Nor Kamariah, Mohd Hanapi, Zurina

    Published 2021
    “…In this article, we introduce a dynamic tree-splitting (DTS) algorithm to resolve RACH collisions for delay-sensitive devices during burst arrival scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An efficient scalable batch-rekeying scheme for secure multicast communication using multiple logical key trees by Zakaria, Omar, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina

    Published 2014
    “…In this paper, a new scheme based on multiple key trees is proposed. Instead of using only a single key tree multiple key trees are used and at the end of each batch time the algorithm decides which tree will be used to update the keys. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Scalable rekeying algorithm in IEEE 802.16e by Sadeghi, Mohammad Mehdi Gilanian, Mohd Ali, Borhanuddin, Ma, Maode, Ab Manan, Jamalul-lail, Noordin, Nor Kamariah, Khatun, Sabira

    Published 2011
    “…This paper proposes a Scalable Rekeying Algorithm (SRA) based on a complete binary tree structure. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    Scalable rekeying algorithm in IEEE 802.16e by Gilanian Sadeghi, Mohammad Mehdi, Borhanuddin, Mohd Ali, Ma, Maode, Jamalul-lail, Ab Manan, Nor Kamariah, Noordin, Sabira, Khatun

    Published 2011
    “…This paper proposes a Scalable Rekeying Algorithm (SRA) based on a complete binary tree structure. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    An efficient model for indoor radio signal prediction and coverage estimation / Md. Sumon Sarker by Md. Sumon, Sarker

    Published 2011
    “…Genetic algorithm is combined with the Breath First Search (BFS) algorithm incorporated with Branch-And-Bound terminology while exploring the search space tree to achieve the optimum coverage solution. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Article