Search alternatives:
code encryption » secure encryption (Expand Search)
node selection » gene selection (Expand Search)
Showing 1 - 18 results of 18 for search '(( node selection algorithm ) OR ( code encryption algorithm ))*', query time: 0.08s Refine Results
  1. 1
  2. 2

    Exploiting Sparsity in Amplify-and-Forward Broadband Multiple Relay Selection by Ala Gouissem (7006463)

    Published 2019
    “…In particular, by separating all the subcarriers or some subcarrier groups from each other and by optimizing the selection and beamforming vector(s) using OMP algorithm, a higher level of frequency diversity can be achieved. …”
  3. 3

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 4

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks by Umesh Kumar Lilhore (17727684)

    Published 2022
    “…In the proposed energy-efficient routing protocol, an enhanced cluster head node is used to select a strategy that can analyze the remaining energy and directions of each participating node. …”
  5. 5
  6. 6

    MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks by Artail, Hassan

    Published 2009
    “…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 7

    A cluster-based model for QoS-OLSR protocol by Otrok, Hadi

    Published 2017
    “…Therefore, we propose a novel clustering algorithm and a relay node selection based on different combinations of metrics, such as connectivity, residual energy, and bandwidth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 8

    The bus sightseeing problem by Qian Hu (205735)

    Published 2023
    “…Significant research focus has been directed toward profitable routing variants due to the practical importance of their applications and their interesting structure, which jointly optimizes node selection and routing decisions. Profitable routing applications arise in the tourism industry aiming to maximize the profit score of attractions visited within a limited time period. …”
  9. 9

    A degree-based heuristic for strongly connected dominating-absorbent sets in wireless ad-hoc networks by Abu-Khzam, Faisal N.

    Published 2017
    “…We introduce a hybrid heuristic for this problem, in which we combine low-degree vertex elimination and high-degree vertex selection. This simple and efficient method yields very promising experimental results, outperforming known heuristic algorithms.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 10
  11. 11

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…We use a semantic-aware inverted index to allow semantic-aware search, result selection, and result ranking functionality. The semantically augmented XML data tree is processed for structural node clustering, based on semantic query concepts (i.e., key-concepts), in order to identify and rank candidate answer sub-trees containing related occurrences of query key-concepts. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 12

    DSDM: A Distributed Service Discovery Model for Manets by Artail, Hassan

    Published 2008
    “…This model is built on top of the network layer of the TCP/IP stack and benefits from the up-to-date routing information enabled by proactive routing protocols that attempt to keep the information in the routing tables of the mobile nodes current. The designed system is based on storing service descriptions in selected nodes that are searched in accordance to a proposed Minimum Distance Packet Forwarding (MDPF) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  13. 13

    A novel network-based SIS framework for improved GA performance by Tohme, Rawane

    Published 2025
    “…Genetic algorithms have long been used to solve complex optimization problems by mimicking natural selection processes. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  14. 14
  15. 15

    Joint Beamforming Design and Power Minimization for Friendly Jamming Relaying Hybrid RF/VLC Systems by Jaber Al-Khori (16855470)

    Published 2019
    “…We first propose a novel joint relay–jammer selection algorithm to enhance the secrecy performance of the network. …”
  16. 16

    Analysis of Multi-User-Based UAV System With Outdated CSI by Parvez Shaik (21633041)

    Published 2024
    “…The impact of decode-and-forward (DF) based relaying and outdated channel state information is assessed at the receiver nodes. To reduce the complexity and retain the MIMO gains, the transmit antenna selection (TAS) strategy is used to select the best antenna at the source and UAV nodes. …”
  17. 17

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. …”
  18. 18

    UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks by Ebrahimi, Dariush

    Published 2018
    “…CDG is utilized to aggregate data en-route from a large set of sensor nodes to selected projection nodes acting as cluster heads in order to reduce the number of needed transmissions leading to notable energy savings and extended network lifetime. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article