Search Results - (( java implementation modified algorithm ) OR ( using access point algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Rogue access point detection and tracking system using trilateration algorithm by Lee, Chiew Min, Ang, Boon Keat, Kok, Ser Leen, Ghali, Abdulrahman Aminu, Sabri, Nor ‘Afifah

    Published 2023
    “…Network security is vulnerable to rogue access points, and unauthorized wireless access points lead to security threats. …”
    Get full text
    Get full text
    Book Section
  4. 4

    Least congested channel recommendation for uncoordinated WiFi access point / Ag Ibrahim Ag Daud by Ag Daud, Ag Ibrahim

    Published 2017
    “…All ten access point model used in the experiment are currently supplied by TM to the customers.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…The separation between uplink and downlink throughputs is based on separating the model equations between the access point and the stations. This separation contributes in determining the effect of access point on the network performance as well as it allows in evaluating the algorithms that based on the differentiation between the access point and stations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Enhanced Handover Algorithm for Quality of Service Maintenance in an Extended Service Set Wi-Fi Network by Derrick Qin Sheng, Wong

    Published 2025
    “…For the enhanced roaming algorithm, two network parameters were considered: current associated stations and signal strength to the access point. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam by Samam, Felix Ceilomond

    Published 2015
    “…In order to create database for indoor navigation system, Wi-Fi access point is required to create the reference point which use fingerprint technique by collecting the RSS I value for each access point (AP). …”
    Get full text
    Get full text
    Thesis
  13. 13

    An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm by Mr, Handrizal, Mr, Muhammad Zarlis, Noraziah, Ahmad, Abdalla, Ahmed N.

    Published 2012
    “…Through this algorithm, each access point (AP) that adjacent will be given different channels based on colours available. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Rogue access point detector in UTAR campus by Kok, Ser Leen

    Published 2024
    “…In contrast, network security may be vulnerable to rogue access points and unauthorised wireless access points that provide security threats. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15
  16. 16

    Detecting rogue access point (RAP) using simple network management protocol (SNMP) by Ahmad, Amran, Hassan, Suhaidi

    Published 2008
    “…Rogue access points (RAPs) expose the enterprise network to a barrage of security vulnerabilities in that they are typically connected to a network port behind the firewall. …”
    Get full text
    Get full text
    Get full text
    Book Section
  17. 17

    Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach with Curated Dataset Generation for Enhanced Security by Pitafi, S., Anwar, T., Dewa Made Widia, I., Yimwadsana, B.

    Published 2023
    “…To overcome these issues in this algorithm, we have improved the existing DBSCAN to ST-DBSCAN where we have used the estimation for the epsilon value and used the Manatton distance formula to find out the distance between points which produces 94.9853 accuracy on our dataset. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol by Zazali, Azyyati Adiah

    Published 2024
    “…However, accurately estimating the number of contending STAs without specific signalling is challenging for Access Points (APs). Using a fixed number of Resource Units (RUs) for the OFDMA backoff (OBO) counter can lead to higher collisions and underutilization. …”
    Get full text
    Get full text
    Get full text
    Thesis