Search Results - bandwidth ((((selection algorithm) OR (generation algorithm))) OR (detection algorithm))
Search alternatives:
- generation algorithm »
-
1
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
Published 2014“…This paper proposes a scheduling algorithm for RAT selection in HWN for bandwidth aggregation. …”
Get full text
Get full text
Proceeding Paper -
2
Holographic mode-selective launch for bandwidth enhancement in multimode fiber
Published 2011“…By using a priori theoretical information to generate the incident modal electric field at the MMF, the bandwidth was increased by up to 3.4 times.…”
Get full text
Get full text
Get full text
Article -
3
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…More importantly, integrating the marker with scheduler algorithms in order to reduce the traffic loss and improve bandwidth fairness. …”
Get full text
Get full text
Thesis -
4
A load-balanced algorithm for Internet Gateway placement in Backbone Wireless Mesh Networks
Published 2024“…In this paper, we propose a Load-balanced Algorithm for IGW placement in BWMN to achieve high-bandwidth network coverage while satisfying QoS constraints. …”
Get full text
Get full text
Article -
5
Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced
Published 2018“…But issues related to non-optimal algorithm for selecting the appropriate Handover Control Parameters (HCPs) needs further attention. …”
Get full text
Get full text
Thesis -
6
Development of new code for optical code division multiple access systems
Published 2011“…This work proposed algorithms for designing a new code with variable cross-correlation properties for the SAC-OCDMA system, namely, Random Diagonal (RD) code. …”
Get full text
Thesis -
7
A NOVEL CONSTRUCTION OF VECTOR COMBINATORIAL (VC) CODE FAMILIES AND DETECTION SCHEME FOR SAC OCDMA SYSTEMS
Published 2010“…In particular, the BER can be significantly improved when the VC optimal channel spacing width is carefully selected; best performance occurs at a spacing bandwidth between 0.8 and 1 nm. …”
Get full text
Get full text
Thesis -
8
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Simultaneously, Cultural Algorithms (CA) will be exploited to optimize the performance of proxy caching in accumulating the knowledge between each generation. …”
Get full text
Get full text
Article -
9
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
Get full text
Get full text
Thesis -
10
A modified digital hysteresis and artificial neural network (ANN) algorithms in single phase shunt active power filter control
Published 2014“…This paper introduces a new effective algorithms for the compensation of this ill effects in the power networks namely the digital hysteresis algorithm with a modification by bandwidth absence in the switching analysis (called bandless digital hysteresis algorithm) and a modified artificial neural network responsible to detect and generate the necessary compensation signal injected on to the power networks by the harmonic agents. …”
Get full text
Get full text
Conference or Workshop Item -
11
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
12
Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony
Published 2022“…In this project, a comparative evaluation of selected algorithms is done to ascertain their applicability, practicality, and adaptability in a cloud scenario. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Application of Ikaz and direct quadrature for solving leakage in pipeline distribution by using transmission line modelling
Published 2019“…However it is difficult to select suitable IMF. Thus the paper proposed the implementation of Integrated Kurtosis-based algorithm Z-filter technique for that allows automatic selection of relevant and appropriates IMF. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
GA-based feature subset selection in a spam/non-spam detection system
Published 2012“…In this paper, a genetic algorithm (GA) is applied during feature selection in effort to decrease the number of useless features in a collection of high-dimensional email body and subject. …”
Get full text
Get full text
Conference or Workshop Item -
15
An analysis of resource sharing scheme in heterogeneous wireless campus network
Published 2013“…It has been found that an efficient scheduling model for packet reordering and a appropriate interface selection mechanism are important for HWN. Besides its benefits, this paper also addresses the schemes including genetic algorithm, fuzzy logic technique and game theory those have been using for bandwidth allocation. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…Finally, the algorithm Void Avoidance Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with the communication void by introducing a simple method to detect a void node and avoid it during the forwarding process. …”
Get full text
Get full text
Thesis -
17
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
Get full text
Get full text
Get full text
Thesis -
18
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…Through effective separation of benign from harmful packet flows, this method lessens the burden on the control plane while preserving communication bandwidth. The results of the tests indicated increased performance in terms of fewer false positives, less CPU utilisation, less control channel bandwidth used, higher packet delivery ratio, and fewer flow requests made to the controller with 99.56% detection accuracy as compared to selected benchmarks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Such an in-band probing algorithm reduces measurement overhead on the selected overlay path. …”
Get full text
Get full text
Thesis -
20
Systematic review of intrusion detection system based on machine learning techniques for internet of things
Published 2023“…We highlighted the most efficient machine learning algorithms and feature selection techniques, along with strategies to address issues related to dataset imbalance in benchmarked datasets, with the goal of fostering the development of robust IDS solutions for IoT security.…”
Get full text
Get full text
Article
