Search Results - bandwidth ((((generation algorithm) OR (selection algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network by Masud, M.H., Abd Latif, Suhaimi, Anwar, Farhat, Alam, M. K.

    Published 2014
    “…This paper proposes a scheduling algorithm for RAT selection in HWN for bandwidth aggregation. …”
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Holographic mode-selective launch for bandwidth enhancement in multimode fiber by Amphawan, Angela

    Published 2011
    “…By using a priori theoretical information to generate the incident modal electric field at the MMF, the bandwidth was increased by up to 3.4 times.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…More importantly, integrating the marker with scheduler algorithms in order to reduce the traffic loss and improve bandwidth fairness. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A load-balanced algorithm for Internet Gateway placement in Backbone Wireless Mesh Networks by Mohammed, Najib Ahmed, Othman, Mohamed

    Published 2024
    “…In this paper, we propose a Load-balanced Algorithm for IGW placement in BWMN to achieve high-bandwidth network coverage while satisfying QoS constraints. …”
    Get full text
    Get full text
    Article
  5. 5

    Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced by Ahmed-Abdulazeez, Mariam Ovayioza

    Published 2018
    “…But issues related to non-optimal algorithm for selecting the appropriate Handover Control Parameters (HCPs) needs further attention. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…This work proposed algorithms for designing a new code with variable cross-correlation properties for the SAC-OCDMA system, namely, Random Diagonal (RD) code. …”
    Get full text
    Thesis
  7. 7

    A NOVEL CONSTRUCTION OF VECTOR COMBINATORIAL (VC) CODE FAMILIES AND DETECTION SCHEME FOR SAC OCDMA SYSTEMS by AHMED MOHMED, HASSAN YOUSIF

    Published 2010
    “…In particular, the BER can be significantly improved when the VC optimal channel spacing width is carefully selected; best performance occurs at a spacing bandwidth between 0.8 and 1 nm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A framework of rough cultural algorithms in optimizing mobile web caching performance by Sulaiman, Sarina, Shamsuddin, Siti Maryam, Abraham, Ajith, Sulaiman, Shahida

    Published 2007
    “…Simultaneously, Cultural Algorithms (CA) will be exploited to optimize the performance of proxy caching in accumulating the knowledge between each generation. …”
    Get full text
    Get full text
    Article
  9. 9

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A modified digital hysteresis and artificial neural network (ANN) algorithms in single phase shunt active power filter control by Sabo, Aliyu, Abdul Wahab, Noor Izzri, Mohd Radzi, Mohd Amran, Mailah, Nashiren Farzilah, Abdul Rahman, Nor Farahaida

    Published 2014
    “…This paper introduces a new effective algorithms for the compensation of this ill effects in the power networks namely the digital hysteresis algorithm with a modification by bandwidth absence in the switching analysis (called bandless digital hysteresis algorithm) and a modified artificial neural network responsible to detect and generate the necessary compensation signal injected on to the power networks by the harmonic agents. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony by Mohd Izuddin Sipluk

    Published 2022
    “…In this project, a comparative evaluation of selected algorithms is done to ascertain their applicability, practicality, and adaptability in a cloud scenario. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    Application of Ikaz and direct quadrature for solving leakage in pipeline distribution by using transmission line modelling by Hanafi, M. Yusop, M. F., Ghazali, W. H., Azmi, Mohd Fadhlan, Mohd Yusof, M. A., PiRemli, M. Z., Noordin

    Published 2019
    “…However it is difficult to select suitable IMF. Thus the paper proposed the implementation of Integrated Kurtosis-based algorithm Z-filter technique for that allows automatic selection of relevant and appropriates IMF. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    GA-based feature subset selection in a spam/non-spam detection system by Behjat, Amir Rajabi, Mustapha, Aida, Nezamabadi-pour, Hossein, Sulaiman, Md. Nasir, Mustapha, Norwati

    Published 2012
    “…In this paper, a genetic algorithm (GA) is applied during feature selection in effort to decrease the number of useless features in a collection of high-dimensional email body and subject. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    An analysis of resource sharing scheme in heterogeneous wireless campus network by Masud, M.H., Abd Latif, Suhaimi, Anwar, Farhat, Hassan Abdalla Hashim, Aisha, Alam, M.K.

    Published 2013
    “…It has been found that an efficient scheduling model for packet reordering and a appropriate interface selection mechanism are important for HWN. Besides its benefits, this paper also addresses the schemes including genetic algorithm, fuzzy logic technique and game theory those have been using for bandwidth allocation. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Void avoidance opportunistic routing density rank based for underwater sensor networks by Ismail, Nasarudin

    Published 2021
    “…Finally, the algorithm Void Avoidance Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with the communication void by introducing a simple method to detect a void node and avoid it during the forwarding process. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…Through effective separation of benign from harmful packet flows, this method lessens the burden on the control plane while preserving communication bandwidth. The results of the tests indicated increased performance in terms of fewer false positives, less CPU utilisation, less control channel bandwidth used, higher packet delivery ratio, and fewer flow requests made to the controller with 99.56% detection accuracy as compared to selected benchmarks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Such an in-band probing algorithm reduces measurement overhead on the selected overlay path. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Systematic review of intrusion detection system based on machine learning techniques for internet of things by Idris, Muhammad, Md Yasin, Sharifah, Audi, Giade Hamza

    Published 2023
    “…We highlighted the most efficient machine learning algorithms and feature selection techniques, along with strategies to address issues related to dataset imbalance in benchmarked datasets, with the goal of fostering the development of robust IDS solutions for IoT security.…”
    Get full text
    Get full text
    Article