Search Results - (( developing internet service algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing internet »
- service algorithm »
- implication based »
- java implication »
-
1
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…Thus, an interest has developed in having the Internet to provide some degree of Quality of Service (QoS). …”
Get full text
Get full text
Thesis -
2
-
3
Evolutionary Algorithms In Auction Models Of Service Procurement
Published 2019“…Along development of technologies and internet, last mile delivery, a service that needs fast decision is getting attention. …”
Get full text
Get full text
Thesis -
4
-
5
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
6
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
Get full text
Get full text
Article -
7
Predicting customer churn in telecommunication service provider industry using Random Forest / Wan Muhammad Naqib Zafran Wan Roslan
Published 2023“…This study aims to throughly explore the Random Forest algorithm, develop a robust Random Forest customer churn predictive model, and evaluate its performance in predicting customer churn within the internet service provider sector. …”
Get full text
Get full text
Thesis -
8
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
Get full text
Get full text
Thesis -
9
Distributed Denial-of-Service Defense System
Published 2006“…The primary objective of this project, which is developing a DDoS defense system, is to provide good service to a victim's legitimate clients during the attack, thus canceling the denial-of-service effect. …”
Get full text
Get full text
Final Year Project -
10
Simulation Of Token Bucket Algorithm For Network Traffic Performance
Published 2020“…Along with the development of internet technologies allows users to do multi-tasking,nonetheless, itinitiates collision.The traffic collision is one of the problems that occurred in the wired network. …”
Get full text
Get full text
Get full text
Article -
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The rise of technology and the Internet has changed how people communicate in society and virtual counselling development since the 1970s. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…Use of Internet enabled mobile devices has facilitated the rapid Use of Internet enabled mobile devices has facilitated the rapid development of location-based services (LBS). …”
Get full text
Get full text
Article -
13
QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol
Published 2006“…Discrete event simulator called OMNeT++ is used for modelling and analysis purposes and model of optical internet backbone area has been developed. The analysis were referred from the average access delay, percentage of loses, jitters and throughput of data (video, voice and text) that has been transferred between two end point via optical internet backbone area. …”
Get full text
Get full text
Conference or Workshop Item -
14
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
15
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
16
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…An upgrade of support node gateways and a network transmission algorithm are key elements of the project. A performance assessment of the proposed algorithm based on the Quality of Service (QoS) is also very crucial. …”
Get full text
Get full text
Final Year Project -
17
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…A suitable query routing algorithm was developed and tested with the DSD architecture.…”
Get full text
Get full text
Thesis -
18
-
19
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…An upgrade of support node gateways and a network transmission algorithm are key elements of the project. A performance assessment of the proposed algorithm based on the Quality of Service (QoS) is also very crucial. …”
Get full text
Get full text
Final Year Project -
20
Cognitive selection mechanism performance in IEEE 802.11 WLAN
Published 2013“…The enhancement reaped from the developed selection algorithm is expected to bring benefit to different user at various places…”
Get full text
Get full text
Get full text
Article
