Search Results - (( developing effective packet algorithm ) OR ( java application using algorithm ))
Search alternatives:
- effective packet »
- packet algorithm »
- java application »
- using algorithm »
-
1
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014“…Therefore, a good strategy of packet queuing algorithm is very important to avoid packets drop. …”
Get full text
Get full text
Article -
2
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014“…Therefore, a good strategy of packet queuing algorithm is very important to avoid packets drop. …”
Get full text
Get full text
Conference or Workshop Item -
3
A study of packet scheduling with mobile cellular channel impairments
Published 2012“…Future works include development of a new packet scheduling algorithm to overcome detrimental effects due to LTE-A channel impairments on the QoS of multimedia services.…”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
Get full text
Get full text
Get full text
Article -
5
A study of packet scheduling with mobile cellular channel impairments
Published 2012“…Future works include development of a new packet scheduling algorithm to overcome detrimental effects due to LTE-A channel impairments on the QoS of multimedia services.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…Secondly, the algorithm Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with redundant packet forwarding by introducing a new method to reduce the redundant packet forwarding while in dense or sparse conditions to improve the energy consumption effectively. …”
Get full text
Get full text
Thesis -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
-
9
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
10
-
11
Efficiency and fairness of new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2011“…In addition, to evaluate the effect of using the AIMD algorithm after its development to measure the efficiency and fairness and find new enhancement results for our approach, which named as the New-AIMD algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Development of AODV based static multi-hop linear routing algorithm using 802.11 wireless sensor network for oil and gas pipeline
Published 2022“…The objective of this research is to develop a reliable AODV based multi-hop linear routing algorithm in accordance with IEEE 802.11 and to analyse the network performance implementing the proposed technique. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Data dissemination in VANETs using clustering and probabilistic forwarding based on adaptive jumping multi-objective firefly optimization
Published 2022“…This developed multi-objective optimization was designated as adaptive jumping multi-objective firefly algorithm (AJ-MOFA). …”
Get full text
Get full text
Article -
14
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…In scientific literatures, packet anonymization is performed according to attribute types (numerical, categorical and hierarchical), not taking into consideration the singular characteristics of the Modbus packet fields, using Euclidean distance algorithms that are not capable to deal with binary data and may result in information loss. …”
Get full text
Get full text
Thesis -
15
ANALYSIS OF PERFORMANCE PARAMETERS FOR WIRELESS NETWORK USING SWITCHING MULTIPLE ACCESS CONTROL METHOD
Published 2023“…Therefore, this work discusses the effectiveness of the developed approach to minimize the cell packet losses and network traffic overload in wireless ATM. …”
Article -
16
Region-based Energy-aware Clustering (REC) for Efficient Packet Forwarding in WSN
Published 2010“…Using OMNet-4.0 simulation tool, the performance of REC is compared with LEACH and EEMC, using performance metrics of energy per packet and average delay. Simulation results demonstrated that the proposed protocol of REC is effective in prolonging the network lifetime, as well as supporting for scalable network.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Effective downlink resource management for wimax networks
Published 2018“…Therefore, EDRM maximised the data transfer rate and reached effective transmission and utilisation in all the developed functions. …”
Get full text
Get full text
Thesis -
20
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis
