Search Results - bandwidth ((((generation algorithm) OR (connection algorithm))) OR (detection algorithm))
Search alternatives:
- generation algorithm »
- connection algorithm »
-
1
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
Get full text
Get full text
Thesis -
2
A traffic signature-based algorithm for detecting scanning internet worms
Published 2009“…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
Get full text
Get full text
Get full text
Article -
3
A load-balanced algorithm for Internet Gateway placement in Backbone Wireless Mesh Networks
Published 2024“…In this paper, we propose a Load-balanced Algorithm for IGW placement in BWMN to achieve high-bandwidth network coverage while satisfying QoS constraints. …”
Get full text
Get full text
Article -
4
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…In the following paper, the effect that changing the fitness cap used in the genetic algorithm has, on a WSN, in terms of lifespan and the quality of lifespan, is documented. …”
Article -
5
Mitigation of Mach Zehnder modulator nonlinearity in millimeter wave radio over fiber system using digital predistortion
Published 2017“…The coefficient computation is performed using recursive prediction error method (RPEM) algorithm which shows a dominant spectral regrowth reduction and in-band distortion reduction with reduced complexity compared to the commonly used slow converging, least mean square algorithm. …”
Get full text
Get full text
Thesis -
6
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
7
Biologically Inspired Network on Chip Fault Tolerant Algorithm Using Time Division Multiplexing
Published 2016“…The technique is fault tolerant as it detects and bypass the faulty interconnects. With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
Get full text
Get full text
Conference or Workshop Item -
8
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Simultaneously, Cultural Algorithms (CA) will be exploited to optimize the performance of proxy caching in accumulating the knowledge between each generation. …”
Get full text
Get full text
Article -
9
Biologically inspired network on chip fault tolerant algorithm using time division multiplexing
Published 2017“…The technique is fault tolerant as it detects and bypass the faulty interconnects. With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
Get full text
Get full text
Article -
10
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Presently, mobility is difficult, if not impossible to detect at the application layer though easily detectable at the network layer. …”
Get full text
Get full text
Thesis -
11
Adaptive Quality Of Service Call Admission Control With User Mobility Prediction For Multimedia Traffic Over Wireless Networks
Published 2003“…The key feature of this framework is the bandwidth reallocation scheme. This scheme is developed to control the bandwidth operation of ongoing connections when the system is overloaded. …”
Get full text
Get full text
Thesis -
12
Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced
Published 2018“…Accessibility of spectrum is a fundamental challenge in future generation networks as current cellular networks suffer severe bandwidth congestion. …”
Get full text
Get full text
Thesis -
13
A modified digital hysteresis and artificial neural network (ANN) algorithms in single phase shunt active power filter control
Published 2014“…This paper introduces a new effective algorithms for the compensation of this ill effects in the power networks namely the digital hysteresis algorithm with a modification by bandwidth absence in the switching analysis (called bandless digital hysteresis algorithm) and a modified artificial neural network responsible to detect and generate the necessary compensation signal injected on to the power networks by the harmonic agents. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
A proactive fuzzy-guided link labeling algorithm based on MIH framework in heterogeneous wireless networks
Published 2023“…Future wireless networks aim to provide a seamless connectivity among different communication networks, while offering a rich range of services with variable bandwidth and quality of service anytime and anywhere. …”
Article -
16
Improving Adaptive Quality of Service for Multimedia Wireless Networks Using Hierarchical Networks Approach
Published 2004“…The key feature of this framework is the integration of the hierarchical network together with the modified Call Admission Control (CAC) algorithm and the bandwidth reallocation scheme. These schemes are developed to control the bandwidth operation of ongoing connections when the system is overloaded depending on the movement speed of a particular user assuming the speed of a mobile user would not be changed throughout the duration of a connection. …”
Get full text
Get full text
Thesis -
17
An analysis of resource sharing scheme in heterogeneous wireless campus network
Published 2013“…Besides its benefits, this paper also addresses the schemes including genetic algorithm, fuzzy logic technique and game theory those have been using for bandwidth allocation. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Quality of service management algorithms in WiMAX networks
Published 2015“…The results show that the proposed algorithms provide enhanced efficient bandwidth and power utilization, grant more connections, assure QoS guarantees to all service classes, and also extend the battery life.…”
Get full text
Get full text
Thesis -
19
Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris
Published 2017“…This research proposed an optimal downlink scheduling algorithm called Video Real-Time Scheduling Algorithm (VRTSA) to support real-time traffic of video in LTE network. …”
Get full text
Get full text
Get full text
Thesis -
20
Traffic Control in a Synchronous Transfer Mode Networks
Published 1995“…Thus, much research is needed not just to improve existing technologies, but to seek a fundamentally different approach toward network architectures and protocols. In particular, new bandwidth allocation and call admission control algorithms need to be studied to meet these new challenges. …”
Get full text
Get full text
Thesis
