Search Results - (( development throughput optimization algorithm ) OR ( java automatic detection algorithm ))
Search alternatives:
- development throughput »
- java »
-
1
QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks
Published 2011“…To overcome these problems Quick Transport Control Protocol (QTCP) algorithm based on optimizations of HS-TCP slow start algorithm and Additive Increase and Multiplicative Decrease (AIMD) algorithm have been proposed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Underwater Acoustic Communication (UWA) Data Packet Size Optimization based on Throughput
Published 2010“…The main contribution of this project is the algorithm and the lookup table construction developed for selecting optimal packet size in underwater communication efficiency.…”
Get full text
Get full text
Final Year Project -
3
Mobile Vision-based Automatic Counting of Bacteria Colonies
Published 2017“…In this paper, we introduce a mobile based computer vision algorithm for automatic bacteria colony counting using morphological operations and transforms in image processing, on a custom Android mobile cross-platform open source software and written in Java, C++ and Open CV computer vision library. …”
Get full text
Get full text
Get full text
Article -
4
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…The IDBA-AFW evaluates the fitness of relay nodes based on multiple criteria, such as energy efficiency, throughput, and end-to-end delay. Both Bat Algorithm parameters and AFW parameters are adaptively tuned to balance exploration and exploitation throughout the optimization process. …”
Get full text
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016Get full text
Get full text
Conference or Workshop Item -
6
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…This algorithm considers the head of line (HOL) delay, achievable throughput, past average throughput and transmitted power. …”
Get full text
Get full text
Thesis -
7
Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks
Published 2016“…The new method is called the Daddy Long-Legs Algorithm (PGO-DLLA), which modifies the standard AODV and optimizes the routing process. …”
Get full text
Get full text
Get full text
Thesis -
8
Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris
Published 2017“…The developed algorithm is simulated in LTE-Sim simulator released 5 in terms of three QoS metrics (1) Packet Loss Ratio (2) Delay (3) Throughput. …”
Get full text
Get full text
Get full text
Thesis -
9
Optimization grid scheduling with priority base and bees algorithm
Published 2014“…The main aim of this current research to propose an optimization of the initial scheduler for grid computing using the bees algorithm. …”
Get full text
Get full text
Get full text
Thesis -
10
An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing
Published 2020“…Ant colony system (ACS), a variant of ant colony optimization (ACO), is one of the promising algorithms for fault tolerance due to its ability to adapt to both static and dynamic combinatorial optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…The algorithm is based on the idea of the optimization problem in which resource allocation problem is formulated as an optimization problem. …”
Get full text
Get full text
Thesis -
12
-
13
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
14
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
15
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
text::Thesis -
16
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2018“…This algorithm considers the head of line (HOL) delay, achievable throughput, past average throughput and transmitted power……”
Get full text
Get full text
Book Section -
17
Efficient flow-based channel assignment schemes for congestion avoidance in wireless mesh networks
Published 2016“…This metric is developed based on analytic throughput model taking into account the impact of low rate links and the hidden nodes on the channel throughput. …”
Get full text
Get full text
Thesis -
18
Resource allocation in coordinated multipoint long term evolution-advanced networks
Published 2015“…The proposed ORA algorithm enhances throughput in LRA while ensuring fairness. …”
Get full text
Get full text
Thesis -
19
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Traffic management algorithms for LEO satellite networks
Published 2016“…The performances of the proposed algorithms are then compared with the previously developed algorithms. …”
Get full text
Get full text
Get full text
Thesis
