Search Results - bandwidth ((((function algorithm) OR (selection algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
2
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
3
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2017“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Book Section -
4
Hybrid Harmony Search Algorithm with Grey Wolf Optimizer and Modified Opposition-based Learning
Published 2019“…Most metaheuristic algorithms, including harmony search (HS), suffer from parameter selection. …”
Get full text
Get full text
Get full text
Article -
5
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
6
Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced
Published 2018“…But issues related to non-optimal algorithm for selecting the appropriate Handover Control Parameters (HCPs) needs further attention. …”
Get full text
Get full text
Thesis -
7
The performance effect due to varying network topologies on a software-defined network employing the k-shortest path
Published 2022“…K-shortest paths algorithm discovers a set of paths ordered in the most optimal, optimal, and suboptimal, has a very wide application is integrated into SDN controller to handle routing functionality. …”
Get full text
Get full text
Article -
8
Application of Ikaz and direct quadrature for solving leakage in pipeline distribution by using transmission line modelling
Published 2019“…Thus the paper proposed the implementation of Integrated Kurtosis-based algorithm Z-filter technique for that allows automatic selection of relevant and appropriates IMF. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
10
ABC-PSO for vertical handover in heterogeneous wireless networks
Published 2017“…Nevertheless, attributes of mobile devices need algorithms that are quick and effective in order to select best available network near real-time. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
GA-based feature subset selection in a spam/non-spam detection system
Published 2012“…In this paper, a genetic algorithm (GA) is applied during feature selection in effort to decrease the number of useless features in a collection of high-dimensional email body and subject. …”
Get full text
Get full text
Conference or Workshop Item -
12
Design and implementation of multimedia digital matrix system
Published 2005“…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
Get full text
Get full text
Conference or Workshop Item -
13
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…Finally, the algorithm Void Avoidance Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with the communication void by introducing a simple method to detect a void node and avoid it during the forwarding process. …”
Get full text
Get full text
Thesis -
14
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
Published 2014“…This paper proposes a scheduling algorithm for RAT selection in HWN for bandwidth aggregation. …”
Get full text
Get full text
Proceeding Paper -
15
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…Through effective separation of benign from harmful packet flows, this method lessens the burden on the control plane while preserving communication bandwidth. The results of the tests indicated increased performance in terms of fewer false positives, less CPU utilisation, less control channel bandwidth used, higher packet delivery ratio, and fewer flow requests made to the controller with 99.56% detection accuracy as compared to selected benchmarks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Such an in-band probing algorithm reduces measurement overhead on the selected overlay path. …”
Get full text
Get full text
Thesis -
20
Systematic review of intrusion detection system based on machine learning techniques for internet of things
Published 2023“…We highlighted the most efficient machine learning algorithms and feature selection techniques, along with strategies to address issues related to dataset imbalance in benchmarked datasets, with the goal of fostering the development of robust IDS solutions for IoT security.…”
Get full text
Get full text
Article
