Search Results - bandwidth ((((solution algorithm) OR (evolutionary algorithm))) OR (encryption algorithm))
Search alternatives:
-
1
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
2
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
3
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
4
A novel approach to signal encryption: improved version of conventional DSSS scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
5
A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
6
Speech coding techniques and algorithms
Published 2011Get full text
Get full text
Get full text
Book Chapter -
7
Enhanced hierarchical dynamic bandwidth allocation algorithm with excess bandwidth and SLA techniques for upstream ethernet PON
Published 2023Subjects:Conference paper -
8
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
Published 2014“…This paper proposes a scheduling algorithm for RAT selection in HWN for bandwidth aggregation. …”
Get full text
Get full text
Proceeding Paper -
9
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limitations of sensors (bandwidth and energy), the majority of them are symmetric key encryption schemes and some others are asymmetric encryption schemes is not recommended to be used because of high time complexity and consumption demand. …”
Get full text
Get full text
Proceeding Paper -
10
Improving the performance of hierarchical bandwidth allocation for upstream EPON
Published 2023“…In this paper, we report the performance of hierarchical bandwidth allocation algorithm incorporated Russian Doll Model (RDM) as a solution to allocate bandwidth for intra- ONU in upstream EPON. …”
Conference paper -
11
A new dynamic bandwidth allocation algorithm for fiber wireless network
Published 2023Conference Paper -
12
Multicast-unicast key management and data delivery method in wireless IPv6 networks
Published 2012“…Considering a highly dense environment where connection of users to the network is frequently changing due to join or leave operations, such approach may burden a network device with a huge amount of complex encryption and decryption process.While a number of algorithms has been proposed to address this issue, most of the existing approaches have to increase their encryption and decryption cycles in order to maintain the security level of the key management, thereby again suffering from high computation cost. …”
Get full text
Get full text
Thesis -
13
Development of security in wireless sensor network using IPv6
Published 2009“…The research proposed XOR encryption algorithm that possesses built-in and enhanced security measure. …”
Get full text
Get full text
Thesis -
14
-
15
An investigation of scheduling and packet reordering algorithms for bandwidth aggregation in heterogeneous wireless networks
Published 2013“…This paper aims to investigate the common scheduling algorithms both adaptive and non-adaptive solutions that have been using in networking and communication field. …”
Get full text
Get full text
Get full text
Article -
16
Efficient bandwidth allocation methods in upstream EPON
Published 2023“…In this paper, the operation of several bandwidth allocation algorithms in upstream Ethernet PON (EPON) is presented. …”
Book Chapter -
17
Development of scalable video compression algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
18
Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt
Published 2021“…Therefore, a tasks distribution in driver scheduling using dynamic set of bandwidth in harmony search algorithm with 2-opt (SBHS2-opt) was proposed in this research. …”
Get full text
Get full text
Get full text
Thesis -
19
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2017“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Book Section -
20
MSS-TCP: a congestion control algorithm for boosting TCP performance in mmwave cellular networks
Published 2025“…Existing congestion control algorithms (CCAs) struggle to fully utilize available bandwidth under these conditions. …”
Get full text
Get full text
Get full text
Article
