Search Results - (( java implementation some algorithm ) OR ( using adaptive queue algorithm ))

Refine Results
  1. 1

    Adaptive medium access control protocol for dynamic medical traffic with quality of service provisioning in wireless body area network by Mohd Ali, Darmawaty, Wan Hassan, Wan Haszerila, Sarang, Sohail, M. Stojanović, Goran, Wan Muhamad, Wan Norsyafizan, Ya'acob, Norsuzila

    Published 2024
    “…Additionally, an M/M/1 queuing algorithm with a non-preemptive priority is modeled using SimEvents in MATLAB to validate the packet delay of the priority queues. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    HF-AQM: An efficient active queue management scheme for wireless local area network environment by Hassan, Suhaidi, Hassan, Atheer F., Arif, Suki

    Published 2017
    “…The simulation results show that HF-AQM manages to gain a higher fairness level in comparison to several types of AQM schemes with higher link utilization due to the adaptation and hybridization that been used in its congestion indicator, control function and feedback function.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adaptive Traffic Prioritization Algorithm Over Ad Hoc Network Using IEEE 802.11e by Anuar, Ammar

    Published 2016
    “…This thesis proposes an adaptive traffic prioritization algorithm over ad hoc network using IEEE 802.11e standard that defines a set of Quality of Service enhancements for wireless LAN applications through modifications to the Media Access Control (MAC) layer. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive Medium Access Control (ADT-MAC) Protocol for Dynamic Medical Traffic with Quality of Service (QoS) provisioning in Wireless Body Area Network (WBAN) by Wan Hassan, Wan Haszerila

    Published 2025
    “…Additionally, an M/M/l queuing algorithm with a non-preemptive priority is modeled using SimEvents in MATLAB to validate the packet delay of different priority queues. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm by Natsheh, Essam Fathi

    Published 2006
    “…Because it it often impossible to know what enviroment the protocol will find itself in, and because the enviroment can change unpredictably, the routing protocol must be able to adapt automatically. In this thesis, we use a fuzzy reasoning algorithm (FRA) as a highly adaptive algorithm to achieve that goal. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Improving utility and recovery algorithms for adaptive real time system in multiprocessor environment by Ahmad, Idawaty

    Published 2012
    “…Among the issues in adaptive real time system is the efficiency of the scheduling algorithm to satisfy the predefined deadline and utility requirements. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks by Mubarak, Mohammed Awadh Ahmed Ben

    Published 2013
    “…Finally, the FuzSAHO decision algorithim is optimized for real-time application, by using a new handover criteria, namely queue length besides RSSI and MS velocity. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A hybrid rate control mechanism for forwarding and congestion control in named data network by Alsamman, Mohammed Gamal

    Published 2020
    “…Therefore, transport algorithms which use conventional paradigms would not work correctly in the NDN environment, since the content source location frequently changes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…The simulation results show that the DRFC algorithm allocates the available bandwidth fairly among the contending ABR sources, while achieving high link utilisation with reasonable growth of queues. …”
    Get full text
    Get full text
    Thesis