Search Results - bandwidth ((((generation algorithm) OR (connection algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A traffic signature-based algorithm for detecting scanning internet worms by M. Rasheed, Mohammad, Ghazali, Osman, Md Norwawi, Norita, M. Kadhum, Mohammed

    Published 2009
    “…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A load-balanced algorithm for Internet Gateway placement in Backbone Wireless Mesh Networks by Mohammed, Najib Ahmed, Othman, Mohamed

    Published 2024
    “…In this paper, we propose a Load-balanced Algorithm for IGW placement in BWMN to achieve high-bandwidth network coverage while satisfying QoS constraints. …”
    Get full text
    Get full text
    Article
  4. 4

    On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks by Ismail Abdullah, Kalid Abdlkader Marsal

    Published 2024
    “…In the following paper, the effect that changing the fitness cap used in the genetic algorithm has, on a WSN, in terms of lifespan and the quality of lifespan, is documented. …”
    Article
  5. 5

    Mitigation of Mach Zehnder modulator nonlinearity in millimeter wave radio over fiber system using digital predistortion by Duraikannan, Shankar

    Published 2017
    “…The coefficient computation is performed using recursive prediction error method (RPEM) algorithm which shows a dominant spectral regrowth reduction and in-band distortion reduction with reduced complexity compared to the commonly used slow converging, least mean square algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Biologically Inspired Network on Chip Fault Tolerant Algorithm Using Time Division Multiplexing by Sethi, Muhammad Athar Javed, Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…The technique is fault tolerant as it detects and bypass the faulty interconnects. With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A framework of rough cultural algorithms in optimizing mobile web caching performance by Sulaiman, Sarina, Shamsuddin, Siti Maryam, Abraham, Ajith, Sulaiman, Shahida

    Published 2007
    “…Simultaneously, Cultural Algorithms (CA) will be exploited to optimize the performance of proxy caching in accumulating the knowledge between each generation. …”
    Get full text
    Get full text
    Article
  9. 9

    Biologically inspired network on chip fault tolerant algorithm using time division multiplexing by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…The technique is fault tolerant as it detects and bypass the faulty interconnects. With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
    Get full text
    Get full text
    Article
  10. 10

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…Presently, mobility is difficult, if not impossible to detect at the application layer though easily detectable at the network layer. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Adaptive Quality Of Service Call Admission Control With User Mobility Prediction For Multimedia Traffic Over Wireless Networks by Prihandoko

    Published 2003
    “…The key feature of this framework is the bandwidth reallocation scheme. This scheme is developed to control the bandwidth operation of ongoing connections when the system is overloaded. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced by Ahmed-Abdulazeez, Mariam Ovayioza

    Published 2018
    “…Accessibility of spectrum is a fundamental challenge in future generation networks as current cellular networks suffer severe bandwidth congestion. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A modified digital hysteresis and artificial neural network (ANN) algorithms in single phase shunt active power filter control by Sabo, Aliyu, Abdul Wahab, Noor Izzri, Mohd Radzi, Mohd Amran, Mailah, Nashiren Farzilah, Abdul Rahman, Nor Farahaida

    Published 2014
    “…This paper introduces a new effective algorithms for the compensation of this ill effects in the power networks namely the digital hysteresis algorithm with a modification by bandwidth absence in the switching analysis (called bandless digital hysteresis algorithm) and a modified artificial neural network responsible to detect and generate the necessary compensation signal injected on to the power networks by the harmonic agents. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    A proactive fuzzy-guided link labeling algorithm based on MIH framework in heterogeneous wireless networks by Salih Y.K., See O.H., Yussof S., Iqbal A., Mohammad Salih S.Q.

    Published 2023
    “…Future wireless networks aim to provide a seamless connectivity among different communication networks, while offering a rich range of services with variable bandwidth and quality of service anytime and anywhere. …”
    Article
  16. 16

    Improving Adaptive Quality of Service for Multimedia Wireless Networks Using Hierarchical Networks Approach by Kandasamy, Saravanan

    Published 2004
    “…The key feature of this framework is the integration of the hierarchical network together with the modified Call Admission Control (CAC) algorithm and the bandwidth reallocation scheme. These schemes are developed to control the bandwidth operation of ongoing connections when the system is overloaded depending on the movement speed of a particular user assuming the speed of a mobile user would not be changed throughout the duration of a connection. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An analysis of resource sharing scheme in heterogeneous wireless campus network by Masud, M.H., Abd Latif, Suhaimi, Anwar, Farhat, Hassan Abdalla Hashim, Aisha, Alam, M.K.

    Published 2013
    “…Besides its benefits, this paper also addresses the schemes including genetic algorithm, fuzzy logic technique and game theory those have been using for bandwidth allocation. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…The results show that the proposed algorithms provide enhanced efficient bandwidth and power utilization, grant more connections, assure QoS guarantees to all service classes, and also extend the battery life.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…This research proposed an optimal downlink scheduling algorithm called Video Real-Time Scheduling Algorithm (VRTSA) to support real-time traffic of video in LTE network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Traffic Control in a Synchronous Transfer Mode Networks by Khalil, Ibrahim

    Published 1995
    “…Thus, much research is needed not just to improve existing technologies, but to seek a fundamentally different approach toward network architectures and protocols. In particular, new bandwidth allocation and call admission control algorithms need to be studied to meet these new challenges. …”
    Get full text
    Get full text
    Thesis