Search Results - (( simulation detection packet algorithm ) OR ( variable optimization based algorithm ))
Search alternatives:
- variable optimization »
- simulation detection »
- detection packet »
- packet algorithm »
-
1
New synchronization protocol for distributed system with TCP extension
Published 2013“…The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
Get full text
Get full text
Thesis -
2
Smart and energy aware routing for the internet of mobile things
Published 2021“…The routing algorithm are developed and coded in Sen Script. In this project, the routing algorithm can perform disqualify node detection and energy aware routing. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Embedded Ethernet System For Real-Time Communication
Published 2018“…MATLAB, Simulink, and Stateflow are used for the Ethernet network model simulation. Based on the simulation, EIED backoff algorithm gave better performance in term of average delay compare to other algorithms. …”
Get full text
Get full text
Monograph -
4
Performance study of large block forward error correction with random early detection queue policy
Published 2009“…In this paper, we report an investigation on performance of the forward error correction (FEC) with random early detection (RED) queuing policy. FEC is a technique that uses redundant packet to reconstruct the dropped packet, while RED is an active queue management algorithm. …”
Get full text
Get full text
Get full text
Book Section -
5
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
Get full text
Get full text
Thesis -
6
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter -
7
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…Secondly, the algorithm Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with redundant packet forwarding by introducing a new method to reduce the redundant packet forwarding while in dense or sparse conditions to improve the energy consumption effectively. …”
Get full text
Get full text
Thesis -
8
-
9
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008“…To carry out this task, several reliable multicast protocols have been proposed to reduce the number of feedback packets from the receiver nodes. This is achieved by placing the responsibility to detect packet loss and initiating loss recovery timer on the receiver nodes which is complemented by feedback suppression. …”
Get full text
Get full text
Thesis -
10
-
11
CDRA: A Community Detection based Routing Algorithm for Link Failure Recovery in Software Defined Networks
Published 2021“…This paper presents a community detection-based routing algorithm (CDRA) for link failure recovery in SDN. …”
Get full text
Get full text
Article -
12
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Therefore, the first problem to be tackled is the privacy optimization of Modbus/TCP packet fields. In scientific literatures, packet anonymization is performed according to attribute types (numerical, categorical and hierarchical), not taking into consideration the singular characteristics of the Modbus packet fields, using Euclidean distance algorithms that are not capable to deal with binary data and may result in information loss. …”
Get full text
Get full text
Thesis -
13
Secure address resolution protocol proxy in software defined network
Published 2018“…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Network tool for preventing DDOS attacks on cloud computing
Published 2015“…The algorithm is implemented in a simulated network environment and results obtained is analyze based on packet delivery ratio.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
15
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Presently, mobility is difficult, if not impossible to detect at the application layer though easily detectable at the network layer. …”
Get full text
Get full text
Thesis -
16
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…Under several simulations, the number of lost packets encountered by VFHO stayed as low as 20 packets when the arrival rate was a maximum of 50 packets per second, and did not exceed 10 packets in the case when packet sizes was at a maximum of 256 Bytes or when buffer size was set to 50 KB. …”
Get full text
Get full text
Thesis -
17
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
18
Adaptive Medium Access Control (ADT-MAC) Protocol for Dynamic Medical Traffic with Quality of Service (QoS) provisioning in Wireless Body Area Network (WBAN)
Published 2025“…Simulation results reveal that the ADT-MAC outperforms benchmark protocols in Packet Delivery Ratio (PDR), packet delay, energy consumption, and network throughput. …”
Get full text
Get full text
Thesis -
19
A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models
Published 2017“…The results show that the neural network optimized with genetic algorithm and trained with an optimally and intelligently selected input vector containing historical load and meteorological variables produced the best prediction accuracy. …”
Get full text
Get full text
Article -
20
Study of nature inspired computing (NIC) technique for optimal reactive power dispatch problems
Published 2017“…In this research, new nature-inspired meta-heuristic optimization algorithms namely moth-flame optimizer (MFO) and Ant Lion Optimizer (ALO) were implemented to address the optimal reactive power dispatch (ORPD) problems. …”
Get full text
Get full text
Research Report
