Search Results - bandwidth ((((normalization algorithm) OR (optimization algorithm))) OR (encryption algorithm))*

Refine Results
  1. 1

    QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks by Qureshi, Barkatullah, Othman, Mohamed, K. Subramaniam, Shamala, Abdul Hamid, Nor Asilah Wati

    Published 2011
    “…To overcome these problems Quick Transport Control Protocol (QTCP) algorithm based on optimizations of HS-TCP slow start algorithm and Additive Increase and Multiplicative Decrease (AIMD) algorithm have been proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Optimizing lossless compression by normalized data length in Huffman Algorithm by Tonny, Hidayat

    Published 2022
    “…It was found that the 4-ary/MQ compression benefits the compressed data that is stored in local storage media as well as for hosting and optimizing bandwidth. The new algorithm also has a good performance in producing optimal CR with fast CT in most of the 16-bit WAV audio datasets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt by Shaffiei, Zatul Alwani

    Published 2021
    “…The existing techniques (HS and its variants) have issues in terms of searching strategy (exploration and exploitation), slow convergence rate and high computation time for solving the scheduling problems maximally or near to optimal one. Therefore, a tasks distribution in driver scheduling using dynamic set of bandwidth in harmony search algorithm with 2-opt (SBHS2-opt) was proposed in this research. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Enhanced chaotic image encryption algorithm based on Baker's map by Salleh, Mazleena, Ibrahim, Subariah, lsnin, Fauz

    Published 2003
    “…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
    Get full text
    Get full text
    Article
  8. 8

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    A novel approach to signal encryption: improved version of conventional DSSS scheme by Mohd Abdur, Rashid, Saiful Bahri, Mohamed, A., Hiral, N., Sakibr

    Published 2011
    “…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
    Get full text
    Get full text
    Article
  11. 11

    A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme by -, Mohd Abdur Rashid, Mohamed, Saiful Bahri, -, A. Hiral, -, N. Sakibr

    Published 2011
    “…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Optimal solution to the fractional knapsack problem for LTE overload-state scheduling by Ferdosian, Nasim, Othman, Mohamed, Kweh, Yeah Lun, Mohd Ali, Borhanuddin

    Published 2016
    “…System performance has been evaluated in terms of loss, delay and throughput in comparison with reference algorithms.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Fair bandwidth assignment in hierarchical scheduling for mobile WiMAX system by Alsahag, Ali Mohammed Mansoor, Mohd Ali, Borhanuddin, Noordin, Nor Kamariah, Mohamad, Hafizal

    Published 2011
    “…Simulations result showed that the proposed algorithm optimize the overall system throughput and assigns bandwidth effectively to the different service classes while ensuring that the QoS requirements are satisfied.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…This thesis describes a new algorithm called “COPPA,” which is an in-band path probing algorithm for measuring the end-to-end available bandwidth of an overlay path accurately and continuously. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi by Azmi, Aini

    Published 2016
    “…Bandwidth Control Algorithms is developed based on Peak Time of day and night. …”
    Get full text
    Get full text
    Article
  19. 19

    Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi by Azmi, Aini

    Published 2016
    “…Bandwidth Control Algorithms is developed based on Peak Time of day and night. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fitted the best 2-parameter CDF compared to WeibuII, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Article