Search Results - (( developing new traffic algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…In this thesis, several proposed algorithms have been developed to improve the traffic performance in the LEO satellite network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…This paper present an analysis of inbound internet traffic and development of Adaptive Policing and Shaping Algorithms on inbound internet traffic and fitted to traffic model. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…This paper present an analysis of inbound internet traffic and development of Adaptive Policing and Shaping Algorithms on inbound internet traffic and fitted to traffic model. …”
    Get full text
    Get full text
    Article
  4. 4

    The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques by Mohammad Syawaludin Syafiq, Hassan

    Published 2016
    “…Moreover, present smart traffic light system requires to adapt with new algorithms and technologies, for instance vision sensors that are able to detect emergency vehicles that needs to pass by a traffic light. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Article
  6. 6

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Design and development of sensor based traffic light system by Albagul, Abdulgani, Hrairi, Meftah, Wahyudi, Martono, Hidayathullah, M. F.

    Published 2006
    “…The main object of this study was to design and implement a suitable algorithm and its simulation for an intelligent traffic signal simulator. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…In addition, the algorithm marks the right amount of yellow traffic into the network proportional to the CIR. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…In addition, an analytical model for the proposed scheme is developed. Secondly, a Load-Aware Weighted Round Robin algorithm (LAWRR) packet scheduling discipline for downlink traffic in 802.16 networks is proposed to improve the poor performance of scheduling algorithm that use static weights under bursty traffic. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An improved machine learning model of massive Floating Car Data (FCD) based on Fuzzy-MDL and LSTM-C for traffic speed estimation and prediction by Ahanin, Fatemeh

    Published 2023
    “…In the first method, a new algorithm called LSTM-C (Long Short-Term Memory (LSTM) with Contrast) is proposed to improve prediction of traffic speed without TSE. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…The purpose of this study was to design and develop new secure plug-in on Microsoft Outlook using integration of symmetric and asymmetric cryptographic algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm by Wan Bejuri, Wan Mohd Ya'akob, Harun, Muhammad Harraz, Mohamad, Abdul Karim

    Published 2022
    “…The system using algorithm using CNN as an algorithm and the architecture used is Tiny-YOLOv2 to detect traffic signs and pedestrians. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Modeling of CO emissions from traffic vehicles using artificial neural networks by Al-Gbur, Omer Saud Azeez, Pradhan, Biswajeet, Mohd Shafri, Helmi Zulhaidi, Shukla, Nagesh, Lee, Chang Wook, Rizeei, Hossein Mojaddadi

    Published 2019
    “…This paper presents a hybrid model based on data mining and GIS models designed to predict vehicular Carbon Monoxide (CO) emitted from traffic on the New Klang Valley Expressway, Malaysia. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun by Koh , Che Hun

    Published 2019
    “…This research aims to develop an effective and high-performance multi-sensor correlation algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Void avoidance opportunistic routing density rank based for underwater sensor networks by Ismail, Nasarudin

    Published 2021
    “…There are three new proposed algorithms introduced to address all three issues which resulted from using the OR approach in UWSNs. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Secure address resolution protocol proxy in software defined network by Munther, Munther Numan

    Published 2018
    “…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis