Search Results - (( developing internet service algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…Thus, an interest has developed in having the Internet to provide some degree of Quality of Service (QoS). …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Evolutionary Algorithms In Auction Models Of Service Procurement by Lee, Chen Wei

    Published 2019
    “…Along development of technologies and internet, last mile delivery, a service that needs fast decision is getting attention. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
    Get full text
    Get full text
    Article
  7. 7

    Predicting customer churn in telecommunication service provider industry using Random Forest / Wan Muhammad Naqib Zafran Wan Roslan by Wan Roslan, Wan Muhammad Naqib Zafran

    Published 2023
    “…This study aims to throughly explore the Random Forest algorithm, develop a robust Random Forest customer churn predictive model, and evaluate its performance in predicting customer churn within the internet service provider sector. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Distributed Denial-of-Service Defense System by Hanasi, Lidiyawatie

    Published 2006
    “…The primary objective of this project, which is developing a DDoS defense system, is to provide good service to a victim's legitimate clients during the attack, thus canceling the denial-of-service effect. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Simulation Of Token Bucket Algorithm For Network Traffic Performance by Yusof, Robiah, Mat Nawi, Nor Afifah

    Published 2020
    “…Along with the development of internet technologies allows users to do multi-tasking,nonetheless, itinitiates collision.The traffic collision is one of the problems that occurred in the wired network. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The rise of technology and the Internet has changed how people communicate in society and virtual counselling development since the 1970s. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…Use of Internet enabled mobile devices has facilitated the rapid Use of Internet enabled mobile devices has facilitated the rapid development of location-based services (LBS). …”
    Get full text
    Get full text
    Article
  13. 13

    QoS Forwarding on the Optical Internet Backbone Area Using R-IWDMTC Protocol by Addie Irawan, Hashim, R. Badlishah, Ahmad

    Published 2006
    “…Discrete event simulator called OMNeT++ is used for modelling and analysis purposes and model of optical internet backbone area has been developed. The analysis were referred from the average access delay, percentage of loses, jitters and throughput of data (video, voice and text) that has been transferred between two end point via optical internet backbone area. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  15. 15

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  16. 16

    OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH by Ngo, Lip Chee

    Published 2014
    “…An upgrade of support node gateways and a network transmission algorithm are key elements of the project. A performance assessment of the proposed algorithm based on the Quality of Service (QoS) is also very crucial. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing by HAJA NAZMUDEEN, MOHAMED SALEEM

    Published 2012
    “…A suitable query routing algorithm was developed and tested with the DSD architecture.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH by Ngo, Lip Chee

    Published 2014
    “…An upgrade of support node gateways and a network transmission algorithm are key elements of the project. A performance assessment of the proposed algorithm based on the Quality of Service (QoS) is also very crucial. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Cognitive selection mechanism performance in IEEE 802.11 WLAN by Hashim, Wahidah, Ismail, Ahmad Fadzil, Ghafar, Nadratul, Dzulkifly, Sumayyah

    Published 2013
    “…The enhancement reaped from the developed selection algorithm is expected to bring benefit to different user at various places…”
    Get full text
    Get full text
    Get full text
    Article