Search Results - (( java application interface algorithm ) OR ( network implementation drops algorithm ))

Refine Results
  1. 1

    QoS evaluation of different TCPs congestion control algorithm using NS2 by Tarmizi, M., Albagul, A., Khalifa, Othman Omran, Wahyudi, Martono

    Published 2006
    “…The user then strives to maximize the sending rate without causing network congestion. To achieve this, the users implement a flow control algorithm that controls the rate at which data packets are sent into the Internet. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis
  3. 3

    IWDSA: a hybrid Intelligent Water Drops with a Simulated Annealing for the localization improvement in wireless sensor networks by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2024
    “…The proposed algorithm, named Intelligent Water Drops with Simulated Annealing (IWDSA), combines two powerful optimization methods: Intelligent Water Drops (IWD) and Simulated Annealing (SA). …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Performance Comparison of Packet Queuing Algorithm in Wireless Networks by Nor Aida, Mahiddin, Raja Hasyifah, Raja Bongsu, Wan Nor Shuhadah, Wan Nik

    Published 2014
    “…However, the increasing data users have caused network congestion. Therefore, a good strategy of packet queuing algorithm is very important to avoid packets drop. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Performance Comparison of Packet Queuing Algorithm in Wireless Networks by Nor Aida, Mahiddin, Raja Hasyifah, Raja Bongsu, Wan Nor Shuhadah, Wan Nik

    Published 2014
    “…However, the increasing data users have caused network congestion. Therefore, a good strategy of packet queuing algorithm is very important to avoid packets drop. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    An enhanced congestion control algorithm for LEO satellite networks by Ayob, Fahrul Hakim, Subramaniam, Shamala, Othman, Mohamed, Zulkarnain, Zuriati

    Published 2018
    “…Since TCP WestwoodNew is designed to be implemented in wired and wireless network environment, there are few drawbacks found when TCP WestwoodNew is implemented in the satellite network environment. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS by AZMAN, MOHAMAD AFIQ

    Published 2014
    “…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS by AZMAN, MOHAMAD AFIQ

    Published 2014
    “…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    AntNet: a robust routing algorithm for data networks by Haseeb, Shariq, Sidek, Khairul Azami, Ismail, Ahmad Faris, Weng Kin, Lai, Yit Mei, Aw

    Published 2004
    “…Successful implementation and operation of a network largely depends on the routing algorithm in use. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Quality of Services for bandwidth management is a crucial task in computer network. Policing and Shaping algorithms are identified as one of the task in bandwidth control, especially in tele-traffic engineering and computer network. …”
    Get full text
    Get full text
    Article
  13. 13

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Quality of Services for bandwidth management is a crucial task in computer network. Policing and Shaping algorithms are identified as one of the task in bandwidth control, especially in tele-traffic engineering and computer network. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Mobile Ad hoc Networks (MANETs) is a self-configuring network that is formed automatically by a collection of mobile nodes. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  16. 16

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    TDMA scheduling analysis of energy consumption for iot wireless sensor network by Islam, Md Ashikul

    Published 2019
    “…The algorithm use time division multiplexing algorithm together with hello message to allocate the neighbors and their energy level to find the best way to communicate and reduce packet drop, less signal interference and increase throughput. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20