Search Results - (( java implementation modified algorithm ) OR ( user evaluation protocol algorithm ))

Refine Results
  1. 1

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…By applying the proposed algorithm, the throughput of EDCA protocol was increased by 42.9% and it can support 14 voice users rather than 11 in the default EDCA protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    MAC Protocol for Opportunistic Spectrum Access in Cognitive Radio System by Armi, Nasrullah, M Saad, M Naufal, Yusoff, Mohd Zuki, Arshad, Muhammad

    Published 2011
    “…Opportunistic Spectrum Access (OSA) brings new research challenges in MAC protocol design. It allows unlicensed users to share licensed spectrum in space and time with no or little interference to Primary Users (PUs). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  6. 6

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2021
    “…The performance of the proposed routing algorithm is evaluated utilizing MATLAB. The assessment results indicate that it can find the forwarding path with comparatively low cost in the premise of ensuring security and has minimized the average energy consumption by nearly 50% even as the number of nodes has increased, when compared with the traditional ACO algorithm, an existing ant colony based routing algorithm and a current routing protocol for IoT.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    An optimized aggregate marker algorithm for bandwidth fairness improvement in classifying traffic networks by Al-Kharasani, Ameen Mohammed Abdulkarem, Othman, Mohamed, Abdullah, Azizol, Kweh, Yeah Lun

    Published 2016
    “…Additionally, the assured service is designed for applications relying on the Transmission Control Protocol (TCP). This article analyses and evaluates a new time sliding window traffic marker algorithm called the Optimized time sliding window Three Colour Marker (OtswTCM). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Optimal Sensing for Opportunistic Spectrum Access in Cognitive Radio by Armi, Nasrullah, M Saad, M Naufal, Yusoff, Mohd Zuki, Arshad, Muhammad

    Published 2010
    “…One of the most difficult things but important problem when designing an OSA (Opportunistic Spectrum Access) MAC protocol is how the unlicensed users decide when and which channel they should sense and access without conflicting the communications among PUs. …”
    Get full text
    Get full text
    Article
  12. 12

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  14. 14

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…Next, the ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    text::Thesis
  15. 15
  16. 16

    Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol by Zazali, Azyyati Adiah

    Published 2024
    “…The simulation results demonstrated that the proposed algorithms significantly outperformed the benchmark algorithms across several metrics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…The proposed FTP scheme was also evaluated using Burrows–Abadi– Needham (BAN) logic analysis for protocol robustness with resistance to replay attacks, stolen-verifier attacks, and perfect forward secrecy. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A comparative study for parameter selection in online auctions by Gan, Kim Soon

    Published 2009
    “…The task even gets more complicated when there are different start and end times and when the auctions employ different protocols. Due to the complex and dynamic nature of the online auction, one of the strategies employed is using genetic algorithm to discover the best strategy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Collision probability of one-to-many reversible mapping for IPV6 address generation by Nashrul Hakiem, Nashrul Hakiem, Siddiqi, Mohammad Umar, Jarot, Sigit Puspito Wigati

    Published 2012
    “…Each time a user accesses the network, a dynamic unicast IPv6 address is given via DHCPv6 (Dynamic Host Configuration Protocol for IPv6) server to protect users from unwanted behavior analysis exploiting IPv6 addresses, thus protecting user privacy. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Particle Swarm Optimization for Bluetooth Scatternet Formation by Kamel , Nidal

    Published 2005
    “…Ab stra ct In this paper, we present and evaluate the performance of a new particle swarm optimization (PSO) based scatternet formation protocol for single hop Bluetooth networks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item