Search Results - bandwidth ((((replication algorithm) OR (generation algorithm))) OR (detection algorithm))
Search alternatives:
- replication algorithm »
- generation algorithm »
-
1
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
Get full text
Get full text
Thesis -
2
A modified digital hysteresis and artificial neural network (ANN) algorithms in single phase shunt active power filter control
Published 2014“…This paper introduces a new effective algorithms for the compensation of this ill effects in the power networks namely the digital hysteresis algorithm with a modification by bandwidth absence in the switching analysis (called bandless digital hysteresis algorithm) and a modified artificial neural network responsible to detect and generate the necessary compensation signal injected on to the power networks by the harmonic agents. …”
Get full text
Get full text
Conference or Workshop Item -
3
Relationship based replication algorithm for data grid
Published 2014“…The Relationship based Replication algorithm aims to improve the Data Grid performance by reducing the job execution time, bandwidth and storage usage.The RBR was realized using a network simulation (OptorSim) and experiment results revealed that it offers better performance than existing replication algorithms.…”
Get full text
Get full text
Monograph -
4
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
Published 2014“…This paper proposes a scheduling algorithm for RAT selection in HWN for bandwidth aggregation. …”
Get full text
Get full text
Proceeding Paper -
5
Replica Creation Algorithm for Data Grids
Published 2012“…Current algorithms focus on number of accesses in deciding which file to replicate and where to place them, which ignores resources’ capabilities. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Dynamic replication aware load blanced scheduling in distributed environment / Said Bakhshad
Published 2018“…We propose a novel dynamic Replication Aware Load Balanced Scheduling (DRALBS) algorithm, that considers the replica location dynamically at the time of the scheduling of the job. …”
Get full text
Get full text
Get full text
Thesis -
7
Development of new code for optical code division multiple access systems
Published 2011“…To overcome the stated problems, RD code families are used throughout this stage. Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
Get full text
Thesis -
8
Holographic mode-selective launch for bandwidth enhancement in multimode fiber
Published 2011“…By using a priori theoretical information to generate the incident modal electric field at the MMF, the bandwidth was increased by up to 3.4 times.…”
Get full text
Get full text
Get full text
Article -
9
Hybrid Graphene–Copper UWB Array Sensor for Brain Tumor Detection via Scattering Parameters in Microwave Detection System
Published 2017“…The sensor used for both transmits equivalent signal and receives backscattering signal from stratified human head model in detecting tumor. Difference in the data of the scattering parameters recorded from the head model with presence and absence of tumor is used as the main data to be further processed in confocal microwave imaging algorithm in generating image. …”
Get full text
Get full text
Get full text
Article -
10
Fair bandwidth assignment in hierarchical scheduling for mobile WiMAX system
Published 2011“…In this paper, we propose a fair bandwidth assignment algorithm that allocates the bandwidth among different services classes based on a hierarchical scheduler. …”
Get full text
Get full text
Conference or Workshop Item -
11
Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt
Published 2021“…Therefore, a tasks distribution in driver scheduling using dynamic set of bandwidth in harmony search algorithm with 2-opt (SBHS2-opt) was proposed in this research. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Development of read-one-write-all synchronization transaction daemon (row A-STD) in distributed system
Published 2010“…A new algorithm has been designed and developed to manage replication and transaction using ROW A-MSTS prototype. …”
Get full text
Get full text
Research Report -
13
A NOVEL CONSTRUCTION OF VECTOR COMBINATORIAL (VC) CODE FAMILIES AND DETECTION SCHEME FOR SAC OCDMA SYSTEMS
Published 2010“…Secondly, a new detection technique based on exclusive-OR (XOR) logic is developed and compared to the reported detection techniques. …”
Get full text
Get full text
Thesis -
14
Mitigation of Mach Zehnder modulator nonlinearity in millimeter wave radio over fiber system using digital predistortion
Published 2017“…The coefficient computation is performed using recursive prediction error method (RPEM) algorithm which shows a dominant spectral regrowth reduction and in-band distortion reduction with reduced complexity compared to the commonly used slow converging, least mean square algorithm. …”
Get full text
Get full text
Thesis -
15
An investigation of scheduling and packet reordering algorithms for bandwidth aggregation in heterogeneous wireless networks
Published 2013“…There are some Internet applications that require high bandwidth and therefore, the bandwidth of an individual interface need to be aggregated to form a high speedy logical link. …”
Get full text
Get full text
Get full text
Article -
16
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
17
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…More importantly, integrating the marker with scheduler algorithms in order to reduce the traffic loss and improve bandwidth fairness. …”
Get full text
Get full text
Thesis -
18
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Presently, mobility is difficult, if not impossible to detect at the application layer though easily detectable at the network layer. …”
Get full text
Get full text
Thesis -
19
-
20
Hybrid of rough set theory and Artificial Immune Recognition System as a solution to decrease false alarm rate in intrusion detection system
Published 2024Subjects:Conference Paper
