Search Results - bandwidth ((((selection algorithm) OR (extraction algorithm))) OR (detection algorithm))

Search alternatives:

Refine Results
  1. 1

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…More importantly, integrating the marker with scheduler algorithms in order to reduce the traffic loss and improve bandwidth fairness. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A modified digital hysteresis and artificial neural network (ANN) algorithms in single phase shunt active power filter control by Sabo, Aliyu, Abdul Wahab, Noor Izzri, Mohd Radzi, Mohd Amran, Mailah, Nashiren Farzilah, Abdul Rahman, Nor Farahaida

    Published 2014
    “…This paper introduces a new effective algorithms for the compensation of this ill effects in the power networks namely the digital hysteresis algorithm with a modification by bandwidth absence in the switching analysis (called bandless digital hysteresis algorithm) and a modified artificial neural network responsible to detect and generate the necessary compensation signal injected on to the power networks by the harmonic agents. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Performance evaluation of compression techniques on scientific dataset / Lam Wai Leong by Lam , Wai Leong

    Published 2006
    “…This project looks into various data compression technique and when to use them, with specifically focus on ii evaluating the performance of existing data compression and extraction algorithms that best suit scientific dataset. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    GA-based feature subset selection in a spam/non-spam detection system by Behjat, Amir Rajabi, Mustapha, Aida, Nezamabadi-pour, Hossein, Sulaiman, Md. Nasir, Mustapha, Norwati

    Published 2012
    “…In this paper, a genetic algorithm (GA) is applied during feature selection in effort to decrease the number of useless features in a collection of high-dimensional email body and subject. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Void avoidance opportunistic routing density rank based for underwater sensor networks by Ismail, Nasarudin

    Published 2021
    “…Finally, the algorithm Void Avoidance Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with the communication void by introducing a simple method to detect a void node and avoid it during the forwarding process. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network by Masud, M.H., Abd Latif, Suhaimi, Anwar, Farhat, Alam, M. K.

    Published 2014
    “…This paper proposes a scheduling algorithm for RAT selection in HWN for bandwidth aggregation. …”
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…Through effective separation of benign from harmful packet flows, this method lessens the burden on the control plane while preserving communication bandwidth. The results of the tests indicated increased performance in terms of fewer false positives, less CPU utilisation, less control channel bandwidth used, higher packet delivery ratio, and fewer flow requests made to the controller with 99.56% detection accuracy as compared to selected benchmarks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Such an in-band probing algorithm reduces measurement overhead on the selected overlay path. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Systematic review of intrusion detection system based on machine learning techniques for internet of things by Idris, Muhammad, Md Yasin, Sharifah, Audi, Giade Hamza

    Published 2023
    “…We highlighted the most efficient machine learning algorithms and feature selection techniques, along with strategies to address issues related to dataset imbalance in benchmarked datasets, with the goal of fostering the development of robust IDS solutions for IoT security.…”
    Get full text
    Get full text
    Article
  12. 12

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…To overcome the stated problems, RD code families are used throughout this stage. Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
    Get full text
    Thesis
  13. 13

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…Presently, mobility is difficult, if not impossible to detect at the application layer though easily detectable at the network layer. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    A NOVEL CONSTRUCTION OF VECTOR COMBINATORIAL (VC) CODE FAMILIES AND DETECTION SCHEME FOR SAC OCDMA SYSTEMS by AHMED MOHMED, HASSAN YOUSIF

    Published 2010
    “…In particular, the BER can be significantly improved when the VC optimal channel spacing width is carefully selected; best performance occurs at a spacing bandwidth between 0.8 and 1 nm. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    A traffic signature-based algorithm for detecting scanning internet worms by M. Rasheed, Mohammad, Ghazali, Osman, Md Norwawi, Norita, M. Kadhum, Mohammed

    Published 2009
    “…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri by Sobri, Nor Syuhaila

    Published 2007
    “…This elicitation is used the scenario-based technique to identify the requirement. We also proposed algorithm of bandwidth detection in order to detect the bandwidth of a current network. …”
    Get full text
    Get full text
    Thesis