Search Results - bandwidth ((((section algorithm) OR (prediction algorithm))) OR (detection algorithm))

Refine Results
  1. 1
  2. 2
  3. 3

    Anomaly behavior detection using flexible packet filtering and support vector machine algorithms by Abdul Wahid, Mohammed N.

    Published 2016
    “…FPF of SVM have merged the analyzed results of flexible packet filtering with support vector machine algorithm to get better classification of the captured network traffics and to detect anomalies. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks by Ismail Abdullah, Kalid Abdlkader Marsal

    Published 2024
    “…In the following study, the radio bandwidth's energy consumption is the target under study, which in turn is predicted to optimize WSN.…”
    Article
  5. 5

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing by Rukshanda, Kamran

    Published 2022
    “…The proposed approach, Energy-Aware Multi-Dimensional Online Bin Packing (EAMDOBP), was tested against Power-aware best fit decreasing algorithm (PABFD), Modified Worst Fit decreasing algorithm (MWFD) and Hybrid Local Regression Host Overload Detection (HLRHOD). …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Adaptive Quality Of Service Call Admission Control With User Mobility Prediction For Multimedia Traffic Over Wireless Networks by Prihandoko

    Published 2003
    “…Based on the mobility prediction, bandwidth is reserved to guarantee the uninterrupted hand off process. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks by Al-Sanabani, Maher Ali

    Published 2008
    “…The second proposed scheme is a bandwidth reservation scheme based on Mobility Prediction Scheme (MPS). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhanced Bandwidth Based Handover Decision Making Algorithm For Small Cell Wireless Networks by Chung, Seng Kheau, Chua, Bih Lii, Mark Irwin Goh, Syed Shajee Husain, Yew, Hoe Tung, Abbas Ibrahim Mbulwa

    Published 2020
    “…To overcome this problem, this paper proposed a new handover decision making algorithm that integrates the traveling distance prediction technique with the bandwidth based handover algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    An investigation of scheduling and packet reordering algorithms for bandwidth aggregation in heterogeneous wireless networks by Latif, Suhaimi A, Masud, Mosharrof Hussain, Anwar, Farhat, Alam, Md Khorshed

    Published 2013
    “…There are some Internet applications that require high bandwidth and therefore, the bandwidth of an individual interface need to be aggregated to form a high speedy logical link. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…More importantly, integrating the marker with scheduler algorithms in order to reduce the traffic loss and improve bandwidth fairness. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Machine learning‐based approach for bandwidth and frequency prediction of circular SIW antenna by Alam, Md Mahabub, Nurhafizah, Abu Talip Yusof, Ahmad Afif, Mohd Faudzi, Tomal, Md Raihanul Islam, Haque, Md Ershadul, Rahman, Md. Suaibur

    Published 2025
    “…Among them, the Extra Trees Regression model achieved over 98% accuracy, with errors below 0.1% for both resonance frequency and bandwidth predictions. The approach was validated through Computer Simulation Technology (CST) simulations and ML-based predictions, both demonstrating strong agreement. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A traffic signature-based algorithm for detecting scanning internet worms by M. Rasheed, Mohammad, Ghazali, Osman, Md Norwawi, Norita, M. Kadhum, Mohammed

    Published 2009
    “…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Balanced femtocell model to enhance indoor coverage in LTE cellular network / Izwah Ismail by Ismail, Izwah

    Published 2018
    “…The results presented have shown 60% improvements by providing enough bandwidth capacity to accommodate the sudden increase of mobile subscribers.…”
    Get full text
    Get full text
    Book Section
  18. 18

    Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri by Sobri, Nor Syuhaila

    Published 2007
    “…This elicitation is used the scenario-based technique to identify the requirement. We also proposed algorithm of bandwidth detection in order to detect the bandwidth of a current network. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique by Al Ogaili, Riyadh Rahef Nuiaa

    Published 2023
    “…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
    Get full text
    Get full text
    Thesis