Search Results - (( using flow protocol algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- protocol algorithm »
- stemming algorithm »
- java application »
- flow protocol »
-
1
An optimized aggregate marker algorithm for bandwidth fairness improvement in classifying traffic networks
Published 2016“…Extensive simulations were carried out to implement the algorithm using the NS2 simulator and compare the proposed marker algorithm with several other algorithms. …”
Get full text
Get full text
Get full text
Article -
2
-
3
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy.…”
Get full text
Get full text
Thesis -
4
The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2010“…In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the New-AIMD algorithm to measure the queue length and end-to-end delays and we will use the NCTUns simulator to get the results after make the modification of the mechanism. …”
Get full text
Get full text
Article -
5
Dynamic Traffic-Light Phase Plan Protocol (DT3P)
Published 2011“…We are proposing a system design with its protocol and set of algorithms to help balancing the road traffic load and make the driving on highways and urban cities roads more comfort. …”
Get full text
Get full text
Conference or Workshop Item -
6
Traffic Light Control Using VANET System Architecture
Published 2011Get full text
Get full text
Conference or Workshop Item -
7
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…This is achieved by using a new design algorithm by separating marker TCP and UDP protocols and extended the marking probability for injecting more green and yellow traffic into the network. …”
Get full text
Get full text
Thesis -
8
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003“…This handover algorithm is based on the modification of the HMIPv6 protocol using the multicast technique concept. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
10
Improving throughput of TCP flows by utilizing TCP-aware backpressure scheduling
Published 2024Conference Paper -
11
Reliable Path Selection Packet Forwarding Routing Protocol for Vehicular Adhoc Networks
Published 2019“…The performance of the protocol is assessed through GloMoSim and VanetMobiSim simulators. …”
Get full text
Get full text
Get full text
Thesis -
12
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014“…The implementation consider the unfairness problem for the per flow throughput in IEEE 802.11 without the modification of the MAC protocol. …”
Get full text
Get full text
Article -
13
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014“…The implementation consider the unfairness problem for the per flow throughput in IEEE 802.11 without the modification of the MAC protocol. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Traffic Light Control via VANET System Architecture
Published 2011“…We are proposing a system design with its protocol and set of algorithms to help balancing the road traffic load and make the driving on highways and urban cities roads more comfort. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006“…To achieve this, the users implement a flow control algorithm that controls the rate at which data packets are sent into the Internet. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
On the delay and link utilization with the new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2010“…We want to evaluate the effect of using the AIMD algorithm after developing it, which we called the New-AIMD algorithm, to find a new approach to measure the end-to-end delay and bottleneck link utilization and use the NCTUns simulator to obtain the results after making the modification for the mechanism. …”
Get full text
Get full text
Get full text
Article -
19
Video traffic analysis on Unifi broadband network / Laina Sofia Mahamad
Published 2017“…Results presents four top traffic protocols are identified which are Transmission Control Protocol (TCP), User Datagram Protocol (UDP) and Quick UDP Internet Connection (QUIC) protocol when streaming the videos in UNIFI network. …”
Get full text
Get full text
Thesis -
20
Detection algorithm for internet worms scanning that used user datagram protocol
Published 2024journal::journal article
