Search Results - (( using active queue algorithm ) OR ( java application designing algorithm ))

Refine Results
  1. 1

    A simulation study of a new rate-and-queue-based active queue management algorithm by Ali Asghar, Jomah Adham, Razman, Mat Tahar

    Published 2012
    “…In order to enhance quality of service (QoS), active queue management (AQM) algorithms are frequently employed due to their efficiency in congestion avoidance as well as the differentiated forwarding of packets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Gps solution for active queue management using android platform by Liu, Yu Yao

    Published 2021
    “…This project introduces a model for effective management of queue in different locations using GPS as a medium. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    HF-AQM: An efficient active queue management scheme for wireless local area network environment by Hassan, Suhaidi, Hassan, Atheer F., Arif, Suki

    Published 2017
    “…An Active Queue Management (AQM) is a proactive scheme that controls the network congestion by avoiding the congestion before it happened.When implementing AQM in wireless networks several contemporary issues must be considered, such as interference, collisions, multipath-fading, propagation distance, shadowing effects and route failure, and whether the wireless networks is WLAN or other type.Therefore, the needs for AQM algorithm that can perform in WLAN network as good and efficient as in wired network become so crucial.This paper proposes a new AQM algorithm called Hybrid Fair AQM (HF-AQM) that can achieve better fairness and higher utilization in WLAN environment by hybridizing queue delay and input rate to measure network congestion. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Performance study of large block forward error correction with random early detection queue policy by Almomani, Omar, Ghazali, Osman, Hassan, Suhaidi

    Published 2009
    “…FEC is a technique that uses redundant packet to reconstruct the dropped packet, while RED is an active queue management algorithm. …”
    Get full text
    Get full text
    Get full text
    Book Section
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Combination of GREEN and SHRed AQM for short-lived traffic by Shaii, Ahmad Qadafi, Ismail, Roslan, Jais, Jamilin

    Published 2008
    “…The majority of traffic flows dominate Internet traffic is Web interactions where they are short-lived HTTP connections handled by TCP.Short-lived traffic is more sensitive to delay and has small congestion windows cwnds.This paper introduces a new active queue management (AQM) algorithms based on combination of GREEN algorithm and SHRED, to tackle issues on Short-lived flows.Active Queue Management (AQM) refers to a method to enhance congestion control, and to achieve trade off between link utilization and delay. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    RED, GRED, AGRED congestion control algorithms in heterogeneous traffic types by Seifaddini, Omid, Abdullah, Azizol, Vosough, Hamid

    Published 2013
    “…There are several Active Queue Management algorithms(AQM) exist to deal with the congestion at the router buffer such as RED, DRED, BLUE, AGRED.This paper presents an analysis of RED, GRED and AGRED algorithms with three different Traffic distributions which are Exponential distribution, Geometrical distribution and ON-OFF model using simulation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Red, gred, agred congestion control algorithms in heterogeneous traffic types by Seifaddini, Omid, Abdullah, Azizol, Vosough, Hamid

    Published 2013
    “…There are several Active Queue Management algorithms (AQM) exist to deal with the congestion at the router buffer such as RED, DRED, BLUE, AGRED. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12
  13. 13

    Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm by Natsheh, Essam Fathi

    Published 2006
    “…These applications are: route lifetime estimation, local connectivity management, nodes affinity management, and active queue management. In the first method, the fuzzy reasoning is used to estimate the time route can stay active in the routing table. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  20. 20

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item