Search Results - (( basic evaluation protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- evaluation protocol »
- protocol algorithm »
- implication based »
- basic evaluation »
- java implication »
-
1
-
2
Progress in various TCP variants (February 2009)
Published 2009“…Transport Control Protocol (TCP), a basic communication language, consists of a set of rules that control communication. …”
Get full text
Get full text
Conference or Workshop Item -
3
Even-odd scheduling based energy efficient routing for wireless sensor network (WSN) / Muhammad Zafar Iqbal Khan
Published 2022“…The performance of the proposed routing algorithm has been evaluated through simulations of well-known software MATLAB. …”
Get full text
Get full text
Thesis -
4
-
5
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…The simulation process was conducted using Network Simulator-3 (NS-3) and the performance of these packet scheduling algorithms were evaluated based on the performance metrics of throughput, delay, packet loss ratio (PLR), energy consumption rate (ECR), and EE for the voice over IP (VoIP), video and File Transfer Protocol (FTP) applications. …”
Get full text
Get full text
Thesis -
6
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…The developed localization framework is separately validated and evaluated each optimized step under various evaluation criteria, in terms of accuracy, stability, and cost, etc. …”
Get full text
Get full text
Thesis -
7
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
8
Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic
Published 2012“…It is a windows application with http connection protocol. In system evaluation used two measurement performances which are precision and mean average precision. …”
Get full text
Get full text
Get full text
Thesis -
9
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
MM-PNEMO: a mathematical model to assess handoff delay and packet loss
Published 2019“…Moreover, a comparative study has been made among the standard Network Mobility Basic Support Protocol (NEMO BSP), Proxy NEMO (PNEMO) and MM-PNEMO scheme respectively. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). …”
Get full text
Get full text
Thesis
