Search Results - (( developing service connection algorithm ) OR ( java evolution optimization algorithm ))

Refine Results
  1. 1

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…The aim of this evolution is to reflect the unseen time overhead incurred by optimal real-time algorithm, represented by LRE-TL, which might hinder the claimed optimality of such algorithms when they are practically implemented. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…The results show that the proposed algorithms provide enhanced efficient bandwidth and power utilization, grant more connections, assure QoS guarantees to all service classes, and also extend the battery life.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks by Alsahag, Ali Mohamemed Mansor

    Published 2014
    “…The aim of this thesis is to develop a fair and effi- cient packet scheduling and adaptive multiuser frequency-time domain resources allocation algorithms to support QoS for a diverse service class in OFDMA based IEEE 802.16 network. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system by Rana, M.M., Romlie, M.F., Abdullah, M.F., Uddin, M., Sarkar, M.R.

    Published 2021
    “…Peak shaving service can be found from this algorithm as a simple and forcible way. …”
    Get full text
    Get full text
    Article
  6. 6

    Wireless water quality cloud monitoring system with self-healing algorithm by Syed Ariffin, Sharifah Hafizah, Baharudin, Muhammad Ariff, Mohd Fauzi, Mohd Husaini, Abdul Latiff, Nurul Mu'azzah, Syed Yusof, Sharifah Kamilah, Abdul Latiff, Nurul Adilah

    Published 2017
    “…The result shows that the self-healing algorithm is able to recover itself without physical reseting, in case during distruption of wireless service connection failure.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Second Level Password Generator by Tay, Choo Chuan, Sakidin, Hamzah, Herman, Nanna Suryana, Baharon, Mohd Rizuan

    Published 2010
    “…The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Cognitive selection mechanism performance in IEEE 802.11 WLAN by Hashim, Wahidah, Ismail, Ahmad Fadzil, Ghafar, Nadratul, Dzulkifly, Sumayyah

    Published 2013
    “…The enhancement reaped from the developed selection algorithm is expected to bring benefit to different user at various places…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An effective islanding detection method for photovoltaic grid connected inverter / Ku Nurul Edhura Ku Ahamad by Ku Nurul Edhura , Ku Ahamad

    Published 2013
    “…A new algorithm is developed in a low cost PIC18F4550. An improved disconnection time in the proposed method compared with that in the previously developed method is an attractive solution for single phase grid connected inverters. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Improving Adaptive Quality of Service for Multimedia Wireless Networks Using Hierarchical Networks Approach by Kandasamy, Saravanan

    Published 2004
    “…As in wireline networks, the wireless network must able to provide a guaranteed quality of service (QoS) over the lifetime of mobile connections. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR) by Noraziah, Ahmad, Abdalla, Ahmed N., Beg, Abul Hashem

    Published 2013
    “…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…Due to the nature of borderless connection, all parties face huge challenges in providing the best quality of services especially in terms of security. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…The developed algorithm is simulated in LTE-Sim simulator released 5 in terms of three QoS metrics (1) Packet Loss Ratio (2) Delay (3) Throughput. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network by Al-Mayouf, Y.R.B., Ismail, M., Abdullah, N.F., Wahab, A.W.A., Mahdi, O.A., Khan, S., Choo, R.K.K.

    Published 2016
    “…An appropriate, efficient, and stable routing algorithm must be developed for various VANET applications to address the issues of dynamic topology and intermittent connectivity. …”
    Get full text
    Get full text
    Article
  16. 16

    Performance Analysis of a Real-Time Adaptive Prediction Algorithm for Traffic Congestion by Nadeem, Khodabacchus Muhamad, Fowdur, Tulsi Pawan

    Published 2018
    “…The implementation consisted of a Global Positioning System based transmitter connected to an Arduino board with a Global System for Mobile/General Packet Radio Service shield that relays the vehicles position to a cloud server. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks by Akanji, Oluwatobi Shadrach, Abisoye, Opeyemi Aderiike, Iliyasu, Mohammed Awwal

    Published 2021
    “…Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease of access to DDoS attack tools. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…The Internet of Things (IoT) is an expanding paradigm of object connectivity using a range of resource types and architectures to deliver ubiquitous and requested services. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Rapid Penang travel planner mobile application using GPS positioning and decision-making algorithm / Naslyiana Abdul Latif by Abdul Latif, Naslyiana

    Published 2015
    “…Thus, this project will describe about Rapid Penang travel planner that implement in mobile application to make user easy get information regarding Rapid Penang services. The technique used by this project are GPS positioning and decision-making algorithm. …”
    Get full text
    Get full text
    Thesis