Search Results - (( development throughput optimization algorithm ) OR ( java implementation case algorithm ))

Refine Results
  1. 1

    QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks by Qureshi, Barkatullah, Othman, Mohamed, K. Subramaniam, Shamala, Abdul Hamid, Nor Asilah Wati

    Published 2011
    “…To overcome these problems Quick Transport Control Protocol (QTCP) algorithm based on optimizations of HS-TCP slow start algorithm and Additive Increase and Multiplicative Decrease (AIMD) algorithm have been proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Underwater Acoustic Communication (UWA) Data Packet Size Optimization based on Throughput by VIRAKRAINGSEI, HAI SOCHEAT

    Published 2010
    “…The main contribution of this project is the algorithm and the lookup table construction developed for selecting optimal packet size in underwater communication efficiency.…”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali by Ihsan , Ali

    Published 2024
    “…The IDBA-AFW evaluates the fitness of relay nodes based on multiple criteria, such as energy efficiency, throughput, and end-to-end delay. Both Bat Algorithm parameters and AFW parameters are adaptively tuned to balance exploration and exploitation throughout the optimization process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…This algorithm considers the head of line (HOL) delay, achievable throughput, past average throughput and transmitted power. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks by Ghathwan, Khalil Ibrahim

    Published 2016
    “…The new method is called the Daddy Long-Legs Algorithm (PGO-DLLA), which modifies the standard AODV and optimizes the routing process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…The developed algorithm is simulated in LTE-Sim simulator released 5 in terms of three QoS metrics (1) Packet Loss Ratio (2) Delay (3) Throughput. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Optimization grid scheduling with priority base and bees algorithm by Ahmed, Mohammed Shihab

    Published 2014
    “…The main aim of this current research to propose an optimization of the initial scheduler for grid computing using the bees algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing by Saufi, Bukhari

    Published 2020
    “…Ant colony system (ACS), a variant of ant colony optimization (ACO), is one of the promising algorithms for fault tolerance due to its ability to adapt to both static and dynamic combinatorial optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…The algorithm is based on the idea of the optimization problem in which resource allocation problem is formulated as an optimization problem. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    text::Thesis
  18. 18

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2018
    “…This algorithm considers the head of line (HOL) delay, achievable throughput, past average throughput and transmitted power……”
    Get full text
    Get full text
    Book Section
  19. 19

    Efficient flow-based channel assignment schemes for congestion avoidance in wireless mesh networks by Abdulla Mogaibel, Hassen Abd-Almotaleb

    Published 2016
    “…This metric is developed based on analytic throughput model taking into account the impact of low rate links and the hidden nodes on the channel throughput. …”
    Get full text
    Get full text
    Thesis
  20. 20