Search Results - bandwidth ((((selection algorithm) OR (connection algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    A traffic signature-based algorithm for detecting scanning internet worms by M. Rasheed, Mohammad, Ghazali, Osman, Md Norwawi, Norita, M. Kadhum, Mohammed

    Published 2009
    “…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A Fast Scheduling Algorithm for WDM Optical Networks by Cheah, Cheng Lai

    Published 2000
    “…Many researches have focused on the scheduling algorithms that perform this kind of coordination. This thesis proposes a scheduling algorithm for the WDM broadcast networks. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…More importantly, integrating the marker with scheduler algorithms in order to reduce the traffic loss and improve bandwidth fairness. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A load-balanced algorithm for Internet Gateway placement in Backbone Wireless Mesh Networks by Mohammed, Najib Ahmed, Othman, Mohamed

    Published 2024
    “…In this paper, we propose a Load-balanced Algorithm for IGW placement in BWMN to achieve high-bandwidth network coverage while satisfying QoS constraints. …”
    Get full text
    Get full text
    Article
  5. 5

    On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks by Ismail Abdullah, Kalid Abdlkader Marsal

    Published 2024
    “…In the following paper, the effect that changing the fitness cap used in the genetic algorithm has, on a WSN, in terms of lifespan and the quality of lifespan, is documented. …”
    Article
  6. 6

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
    Get full text
    Get full text
    Thesis
  7. 7

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
    Get full text
    Get full text
    Thesis
  8. 8

    QoS based admission control using multipath scheduler for IP over satellite networks by Audah, Lukman, Sun, Zhili, Cruickshank, Haitham

    Published 2017
    “…This paper presents a novel scheduling algorithm to support quality of service (QoS) for multiservice applications over integrated satellite and terrestrial networks using admission control system with multipath selection capabilities. …”
    Get full text
    Get full text
    Article
  9. 9

    Biologically Inspired Network on Chip Fault Tolerant Algorithm Using Time Division Multiplexing by Sethi, Muhammad Athar Javed, Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…The technique is fault tolerant as it detects and bypass the faulty interconnects. With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Biologically inspired network on chip fault tolerant algorithm using time division multiplexing by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…The technique is fault tolerant as it detects and bypass the faulty interconnects. With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
    Get full text
    Get full text
    Article
  11. 11

    A framework of rough cultural algorithms in optimizing mobile web caching performance by Sulaiman, Sarina, Shamsuddin, Siti Maryam, Abraham, Ajith, Sulaiman, Shahida

    Published 2007
    “…Servers have become extremely powerful and the bandwidth of end user connections and backbones grow constantly during the previous decade. …”
    Get full text
    Get full text
    Article
  12. 12

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…Then, a multi criteria with two-threshold algorithm is proposed to prioritize the selection between the LTE and WiMAX as target technologies. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced by Ahmed-Abdulazeez, Mariam Ovayioza

    Published 2018
    “…But issues related to non-optimal algorithm for selecting the appropriate Handover Control Parameters (HCPs) needs further attention. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Load balancing and congestion control in ATM using fuzzy logic and spiking neuron network / Tan Jiann Shin by Tan, Jiann Shin

    Published 2005
    “…Bandwidth packing is a concept of grouping similar traffic which requires similar bandwidth utilization on high utilization links to save bandwidth on other low utilization links for high requirement connections. …”
    Get full text
    Get full text
    Thesis
  15. 15

    ABC-PSO for vertical handover in heterogeneous wireless networks by Goudarzi, Shidrokh, Hassan, Wan Haslina, Anisi, Mohammad Hossein, Soleymani, Seyed Ahmad, Sookhak, Mehdi, Khan, Muhammad Khurram, Hassan Abdalla Hashim, Aisha, Zareei, Mahdi

    Published 2017
    “…Nevertheless, attributes of mobile devices need algorithms that are quick and effective in order to select best available network near real-time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Application of Ikaz and direct quadrature for solving leakage in pipeline distribution by using transmission line modelling by Hanafi, M. Yusop, M. F., Ghazali, W. H., Azmi, Mohd Fadhlan, Mohd Yusof, M. A., PiRemli, M. Z., Noordin

    Published 2019
    “…However it is difficult to select suitable IMF. Thus the paper proposed the implementation of Integrated Kurtosis-based algorithm Z-filter technique for that allows automatic selection of relevant and appropriates IMF. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An analysis of resource sharing scheme in heterogeneous wireless campus network by Masud, M.H., Abd Latif, Suhaimi, Anwar, Farhat, Hassan Abdalla Hashim, Aisha, Alam, M.K.

    Published 2013
    “…It has been found that an efficient scheduling model for packet reordering and a appropriate interface selection mechanism are important for HWN. Besides its benefits, this paper also addresses the schemes including genetic algorithm, fuzzy logic technique and game theory those have been using for bandwidth allocation. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    GA-based feature subset selection in a spam/non-spam detection system by Behjat, Amir Rajabi, Mustapha, Aida, Nezamabadi-pour, Hossein, Sulaiman, Md. Nasir, Mustapha, Norwati

    Published 2012
    “…In this paper, a genetic algorithm (GA) is applied during feature selection in effort to decrease the number of useless features in a collection of high-dimensional email body and subject. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…The results show that the proposed algorithms provide enhanced efficient bandwidth and power utilization, grant more connections, assure QoS guarantees to all service classes, and also extend the battery life.…”
    Get full text
    Get full text
    Thesis