Search Results - (( developing tcp based algorithm ) OR ( java visualization using algorithm ))
Search alternatives:
- java visualization »
- using algorithm »
- developing tcp »
- tcp based »
-
1
QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks
Published 2011“…To overcome these problems Quick Transport Control Protocol (QTCP) algorithm based on optimizations of HS-TCP slow start algorithm and Additive Increase and Multiplicative Decrease (AIMD) algorithm have been proposed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
3
Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks
Published 2019“…Unfortunately, the huge bandwidth-delay product (BDP) of these networks hinders TCP from achieving full bandwidth utilization. In order to increase TCP flexibility to adapt for high-BDP networks, we propose a new delay-based and RTT-independent congestion control algorithm (CCA), namely Elastic-TCP. …”
Get full text
Get full text
Get full text
Article -
4
A performance analysis of association rule mining algorithms
Published 2016“…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
Get full text
Get full text
Conference or Workshop Item -
5
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
6
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Analysis of tumour control probability, normal tissue complication probability and isotoxic effects for prostate cancer
Published 2016“…The treatment plans were then recalculated using Pencil Beam algorithm and similar TCP, NTCP and isotoxic effects were evaluated. …”
Get full text
Get full text
Monograph -
8
Increasing TCP friendliness by implementing simple adaptive congestion control framework in wireless network
Published 2018“…As new connection innovations and sub-systems multiply and develop an extensive number of TCP variations have been produced for various kinds of the system situations. …”
Get full text
Get full text
Thesis -
9
Visdom: Smart guide robot for visually impaired people
Published 2025“…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
Get full text
Get full text
Thesis -
11
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
Get full text
Get full text
Get full text
Article -
12
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…To achieve such a goal, this research improves the Intention-driven ICMP traceback model by filtering normal flow in the specific short time and two new algorithms in UDP-based and TCP-based attack are applied. …”
Get full text
Get full text
Thesis -
13
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Algorithms are developed for a simulated mobile robot that uses an array of range finders for navigation. …”
Get full text
Get full text
Monograph -
14
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
16
Development of a task-oriented, auction-based task allocation framework for a heterogeneous multirobot system
Published 2020“…The developed framework consists of a novel heuristic-based task allocation algorithm and communication module. …”
Get full text
Get full text
Get full text
Article -
17
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
18
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
Get full text
Get full text
Thesis -
19
-
20
Encryption method for SCADA security enhancement
Published 2014“…Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. …”
Get full text
Get full text
Get full text
Article
