Search Results - (( using modification protocol algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- using modification »
- protocol algorithm »
- testing algorithm »
- java application »
-
1
-
2
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…This thesis proposes some techniques to enhance the AMTree protocol. First we propose two algorithms to improve the handoff process in AMTree protocol. …”
Get full text
Get full text
Thesis -
3
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2010“…In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the New-AIMD algorithm to measure the queue length and end-to-end delays and we will use the NCTUns simulator to get the results after make the modification of the mechanism. …”
Get full text
Get full text
Article -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
A hybrid residue based sequential encoding mechanism with XGBoost improved ensemble model for identifying 5-hydroxymethylcytosine modifications
Published 2025“…Among the applied machine learning algorithms, the XGBoost ensemble model using the tenfold cross-validation test achieved improved results than existing state-of-the-art models. …”
Article -
8
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014“…The implementation consider the unfairness problem for the per flow throughput in IEEE 802.11 without the modification of the MAC protocol. We simulate the enhanced packet queuing algorithm using OMNET++. …”
Get full text
Get full text
Article -
9
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014“…The implementation consider the unfairness problem for the per flow throughput in IEEE 802.11 without the modification of the MAC protocol. We simulate the enhanced packet queuing algorithm using OMNET++. …”
Get full text
Get full text
Conference or Workshop Item -
10
Vehicular ad-hoc network (vanets) for electrical vehicle charging management
Published 2025text::Thesis -
11
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003“…Our design objective is to re-establish the communication traffic flow quickly and to minimize the service disruption delay that occnrs during handover process in a macro mobility environment. This handover algorithm is based on the modification of the HMIPv6 protocol using the multicast technique concept. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Efficiency and fairness of new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2011“…The NCTUns simulator is used to obtain the results after implementing the modifications to the mechanism.…”
Get full text
Get full text
Get full text
Article -
13
A new routing metric for DYMO protocol on mobile AD HOC network
Published 2013“…To overcome this problem, several important modifications to the routing protocol algorithms are then considered to operate better in networks. …”
Get full text
Get full text
Get full text
Thesis -
14
On the delay and link utilization with the new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2010“…We want to evaluate the effect of using the AIMD algorithm after developing it, which we called the New-AIMD algorithm, to find a new approach to measure the end-to-end delay and bottleneck link utilization and use the NCTUns simulator to obtain the results after making the modification for the mechanism. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2009“…Approach: In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the AIMD algorithm after developing it to find a new approach, as we called it the New-AIMD algorithm to measure the bottleneck link utilization and use the NCTUns simulator to get the results after make the modification of the mechanism. …”
Get full text
Get full text
Article -
18
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
19
-
20
