Search Results - (( using flow drops algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- using algorithm »
- flow drops »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006“…To achieve this, the users implement a flow control algorithm that controls the rate at which data packets are sent into the Internet. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
-
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
The Use of Artificial Neural Networks and Genetic Algorithms for Effectively Optimizing Production from Multiphase Flow Wells
Published 2010“…The need for accurate prediction of these parameters is a key factor in clearly understanding multiphase flow in tubing. Prediction of pressure drop in multiphase flow is quite difficult and complicated due to the complex relationships between the various parameters involved. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
ANALYSIS AND OPTIMIZATION OF HYDROCYCLONE GEOMETRY USING BOX-BEHNKEN AND MULTI-OBJECTIVE OPTIMIZATION ALGORITHM
Published 2021“…Therefore, the objectives of this research are to investigate hydrocyclone geometrical parameters impact onto performance (pressure drop, flow split and separation efficiency) using Box-Behnken, analysis of multivariate analysis of variance of geometrical parameters against performances and investigate and validate the effectiveness of multi objective optimization algorithm. …”
Get full text
Get full text
Thesis -
7
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
Get full text
Get full text
Article -
8
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
Get full text
Get full text
Thesis -
9
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
10
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
12
High Viscous Fluid Transport Model
Published 2004“…This set of transport equations relates steady state flow and accounts for heat transfer. PIPEPHASE, a pipeline simulation tool, was used to model the flow of high viscous fluid. …”
Get full text
Get full text
Final Year Project -
13
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014“…Therefore, a good strategy of packet queuing algorithm is very important to avoid packets drop. …”
Get full text
Get full text
Article -
14
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014“…Therefore, a good strategy of packet queuing algorithm is very important to avoid packets drop. …”
Get full text
Get full text
Conference or Workshop Item -
15
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
Published 2017“…CHID applied attribute wrapper features evaluation algorithms that marked malicious flows for further analysis by the packet-based detection. …”
Get full text
Get full text
Get full text
Thesis -
16
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
-
18
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
19
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
20
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
