Search Results - bandwidth ((((connection algorithm) OR (selection algorithm))) OR (detection algorithm))
Search alternatives:
- connection algorithm »
-
1
A traffic signature-based algorithm for detecting scanning internet worms
Published 2009“…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
Get full text
Get full text
Get full text
Article -
2
A Fast Scheduling Algorithm for WDM Optical Networks
Published 2000“…Many researches have focused on the scheduling algorithms that perform this kind of coordination. This thesis proposes a scheduling algorithm for the WDM broadcast networks. …”
Get full text
Get full text
Thesis -
3
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…More importantly, integrating the marker with scheduler algorithms in order to reduce the traffic loss and improve bandwidth fairness. …”
Get full text
Get full text
Thesis -
4
A load-balanced algorithm for Internet Gateway placement in Backbone Wireless Mesh Networks
Published 2024“…In this paper, we propose a Load-balanced Algorithm for IGW placement in BWMN to achieve high-bandwidth network coverage while satisfying QoS constraints. …”
Get full text
Get full text
Article -
5
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…In the following paper, the effect that changing the fitness cap used in the genetic algorithm has, on a WSN, in terms of lifespan and the quality of lifespan, is documented. …”
Article -
6
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
7
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
Get full text
Get full text
Thesis -
8
QoS based admission control using multipath scheduler for IP over satellite networks
Published 2017“…This paper presents a novel scheduling algorithm to support quality of service (QoS) for multiservice applications over integrated satellite and terrestrial networks using admission control system with multipath selection capabilities. …”
Get full text
Get full text
Article -
9
Biologically Inspired Network on Chip Fault Tolerant Algorithm Using Time Division Multiplexing
Published 2016“…The technique is fault tolerant as it detects and bypass the faulty interconnects. With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
Get full text
Get full text
Conference or Workshop Item -
10
Biologically inspired network on chip fault tolerant algorithm using time division multiplexing
Published 2017“…The technique is fault tolerant as it detects and bypass the faulty interconnects. With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
Get full text
Get full text
Article -
11
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Servers have become extremely powerful and the bandwidth of end user connections and backbones grow constantly during the previous decade. …”
Get full text
Get full text
Article -
12
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…Then, a multi criteria with two-threshold algorithm is proposed to prioritize the selection between the LTE and WiMAX as target technologies. …”
Get full text
Get full text
Thesis -
13
Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced
Published 2018“…But issues related to non-optimal algorithm for selecting the appropriate Handover Control Parameters (HCPs) needs further attention. …”
Get full text
Get full text
Thesis -
14
Load balancing and congestion control in ATM using fuzzy logic and spiking neuron network / Tan Jiann Shin
Published 2005“…Bandwidth packing is a concept of grouping similar traffic which requires similar bandwidth utilization on high utilization links to save bandwidth on other low utilization links for high requirement connections. …”
Get full text
Get full text
Thesis -
15
ABC-PSO for vertical handover in heterogeneous wireless networks
Published 2017“…Nevertheless, attributes of mobile devices need algorithms that are quick and effective in order to select best available network near real-time. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Application of Ikaz and direct quadrature for solving leakage in pipeline distribution by using transmission line modelling
Published 2019“…However it is difficult to select suitable IMF. Thus the paper proposed the implementation of Integrated Kurtosis-based algorithm Z-filter technique for that allows automatic selection of relevant and appropriates IMF. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
18
An analysis of resource sharing scheme in heterogeneous wireless campus network
Published 2013“…It has been found that an efficient scheduling model for packet reordering and a appropriate interface selection mechanism are important for HWN. Besides its benefits, this paper also addresses the schemes including genetic algorithm, fuzzy logic technique and game theory those have been using for bandwidth allocation. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
GA-based feature subset selection in a spam/non-spam detection system
Published 2012“…In this paper, a genetic algorithm (GA) is applied during feature selection in effort to decrease the number of useless features in a collection of high-dimensional email body and subject. …”
Get full text
Get full text
Conference or Workshop Item -
20
Quality of service management algorithms in WiMAX networks
Published 2015“…The results show that the proposed algorithms provide enhanced efficient bandwidth and power utilization, grant more connections, assure QoS guarantees to all service classes, and also extend the battery life.…”
Get full text
Get full text
Thesis
