Search Results - bandwidth ((((exraction algorithm) OR (connection algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    A traffic signature-based algorithm for detecting scanning internet worms by M. Rasheed, Mohammad, Ghazali, Osman, Md Norwawi, Norita, M. Kadhum, Mohammed

    Published 2009
    “…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks by Ismail Abdullah, Kalid Abdlkader Marsal

    Published 2024
    “…In the following paper, the effect that changing the fitness cap used in the genetic algorithm has, on a WSN, in terms of lifespan and the quality of lifespan, is documented. …”
    Article
  3. 3

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
    Get full text
    Get full text
    Thesis
  4. 4

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Biologically Inspired Network on Chip Fault Tolerant Algorithm Using Time Division Multiplexing by Sethi, Muhammad Athar Javed, Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…The technique is fault tolerant as it detects and bypass the faulty interconnects. With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Biologically inspired network on chip fault tolerant algorithm using time division multiplexing by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…The technique is fault tolerant as it detects and bypass the faulty interconnects. With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
    Get full text
    Get full text
    Article
  7. 7

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…The results show that the proposed algorithms provide enhanced efficient bandwidth and power utilization, grant more connections, assure QoS guarantees to all service classes, and also extend the battery life.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Impact of multiplay transmission in mobile WIMAX using overlay scanning: article / Akmarya Syukhairilnisah Mohd Akhir by Mohd Akhir, Akmarya Syukhairilnisah

    Published 2014
    “…The mobile WiMAX air interface utilizes orthogonal frequency division multiple access (OFDMA) as the preferred multiple-access method in the downlink (DL) and uplink (UL) for improved multipath performance and bandwidth scalability.All simulations are run using MATLAB software to develop a new Overlay Scanning Mechanism (OSMA) algorithm. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Impact of multiplay transmission in mobile WIMAX using overlay scanning / Akmarya Syukhairilnisah Mohd Akhir by Mohd Akhir, Akmarya Syukhairilnisah

    Published 2014
    “…The mobile WiMAX air interface utilizes orthogonal frequency division multiple access(OFDMA) as the preferred multiple-access method in the downlink (DL) and uplink(UL) for improved multipath performance and bandwidth scalability. All simulations are run using MATLAB software to develop a new Overlay Scanning Mechanism(OSMA) algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks by Alsahag, Ali Mohamemed Mansor

    Published 2014
    “…The Third contribution is an efficient bandwidth allocation algorithm for the uplink transmission called Fuzzy Adaptive Deficit Round Robin (FADRR). …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks by Al-Sanabani, Maher Ali

    Published 2008
    “…This scheme harnesses the combinations of Call Admission Control (CAC), an Adaptive Bandwidth Allocation (ABA) algorithm with micro-Acceptable Bandwidth Level (micro-ABL) and the Connection Management Table (CMT). …”
    Get full text
    Get full text
    Thesis
  14. 14

    Satellite data communications (TCP/IP over satellite): performance issues / Haslina Tamsir by Tamsir, Haslina

    Published 1998
    “…From the investigation, the first condition proved that in error free and without employing the congestion control algorithms, 5 data connections can fully utilize the available bandwidth. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks by Alrshah, Mohamed Alhadi Mahmoud, Al-Moqri, Mohamed A., Othman, Mohamed

    Published 2019
    “…As known, the Transmission Control Protocol (TCP) is the predominant protocol used to provide such connectivity among these data centers. Unfortunately, the huge bandwidth-delay product (BDP) of these networks hinders TCP from achieving full bandwidth utilization. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…Presently, mobility is difficult, if not impossible to detect at the application layer though easily detectable at the network layer. …”
    Get full text
    Get full text
    Thesis
  17. 17

    QoS based admission control using multipath scheduler for IP over satellite networks by Audah, Lukman, Sun, Zhili, Cruickshank, Haitham

    Published 2017
    “…Each connection of a traffic type will be routed over a link with the least bandwidth load and queue length at current time in order to avoid congestion state. …”
    Get full text
    Get full text
    Article
  18. 18

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…Moreover, three proposed approaches for gateway discovery are implemented; propose a forwarding algorithm, and route determination algorithm for default route and host route in MANET are investigated.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Adaptive Quality Of Service Call Admission Control With User Mobility Prediction For Multimedia Traffic Over Wireless Networks by Prihandoko

    Published 2003
    “…The key feature of this framework is the bandwidth reallocation scheme. This scheme is developed to control the bandwidth operation of ongoing connections when the system is overloaded. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Unidirectional wideband antenna with improved circular parasitic element for microwave breast imaging applications by Koma' Rudin, Nur ' Atika

    Published 2024
    “…The proposed antenna, enhanced by a double-reflector element, exhibited improved performance, broad 3.06 GHz to 7.0 GHz bandwidth, with measurement result of directivity (6.98 dBi), FBR (9.81 dB), and gain (5.44 dBi).The antenna and breast phantom, connected to a vector network analyzer, utilized a MATLAB algorithm (modified Delay and Sum imaging) for signal processing and image reconstruction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis