Artykuły w czasopismach na temat „Packet drop probability”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 44 najlepszych artykułów w czasopismach naukowych na temat „Packet drop probability”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
AL-DIABAT, MOFLEH, HUSSEIN ABDEL-JABER, FADI THABTAH, OSMAN ABOU-RABIA i MAHMOUD KISHTA. "ANALYTICAL MODELS BASED DISCRETE-TIME QUEUEING FOR THE CONGESTED NETWORK". International Journal of Modeling, Simulation, and Scientific Computing 03, nr 01 (marzec 2012): 1150004. http://dx.doi.org/10.1142/s1793962311500048.
Pełny tekst źródłaHamadneh, Nabhan, Mamoon Obiedat, Ahmad Qawasmeh i Mohammad Bsoul. "HRED, An Active Queue Management Algorithm for TCP Congestion Control". Recent Patents on Computer Science 12, nr 3 (8.05.2019): 212–17. http://dx.doi.org/10.2174/2213275912666181205155828.
Pełny tekst źródłaJafri, Syed Talib Abbas, Irfan Ahmed i Sundus Ali. "Queue-Buffer Optimization Based on Aggressive Random Early Detection in Massive NB-IoT MANET for 5G Applications". Electronics 11, nr 18 (18.09.2022): 2955. http://dx.doi.org/10.3390/electronics11182955.
Pełny tekst źródłaBemani, Ali, i Niclas Björsell. "Distributed Event Triggering Algorithm for Multi-Agent System over a Packet Dropping Network". Sensors 21, nr 14 (15.07.2021): 4835. http://dx.doi.org/10.3390/s21144835.
Pełny tekst źródłaHassan, Samuuel Oluwatosin, Vivian Ogochukwu Nwaocha, Adewole Usman Rufai, Tola John Odule, Theophilus Aniemeka Enem, Lukman Adebayo Ogundele i Suleiman Abu Usman. "Random early detection-quadratic linear: an enhanced active queue management algorithm". Bulletin of Electrical Engineering and Informatics 11, nr 4 (1.08.2022): 2262–72. http://dx.doi.org/10.11591/eei.v11i4.3875.
Pełny tekst źródłaLiang, Guangjun, Qi Zhu, Jianfang Xin, Jiashan Tang i Tianjiao Zhang. "Performance Analysis of Buffer-Aided Relaying System Based on Data and Energy Coupling Queuing Model for Cooperative Communication Networks". Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/9287489.
Pełny tekst źródłaSharma, Mohit K., i Chandra R. Murthy. "Packet Drop Probability Analysis of Dual Energy Harvesting Links With Retransmission". IEEE Journal on Selected Areas in Communications 34, nr 12 (grudzień 2016): 3646–60. http://dx.doi.org/10.1109/jsac.2016.2611919.
Pełny tekst źródłaPreye, Uguta Henry, i Onyejegbu Laeticia Nneka. "An Intelligent Fuzzy Logic System for Network Congestion Control". Circulation in Computer Science 2, nr 11 (20.12.2017): 23–30. http://dx.doi.org/10.22632/ccs-2017-252-69.
Pełny tekst źródłaRawayau, Aminu Haruna, Muhammad Dikko Amadi, Mubarak Kabir Kankara, Mahmud Muhammad Yahaya i Samaila Bello. "HEURISTIC GATEWAY PLACEMENT FOR MINIMAL TRANSMISSION POWER & COLLISION PROBABILITY IN AN INTERNET OF THINGS LOW POWER WIDE AREA NETWORK (HGPMTPIoT-LPWAN)". FUDMA JOURNAL OF SCIENCES 7, nr 3 (21.05.2023): 1–6. http://dx.doi.org/10.33003/fjs-2023-0703-1765.
Pełny tekst źródłaBoriboon, Anupon, i Siriwhaddhanah Pongpadpinit. "The HSBQ Algorithm with Triple-play Services for Broadband Hybrid Satellite Constellation Communication System". International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems 5, nr 2 (8.07.2016): 108. http://dx.doi.org/10.11601/ijates.v5i2.169.
Pełny tekst źródłaChydzinski, Andrzej, i Blazej Adamczyk. "On the Influence of AQM on Serialization of Packet Losses". Sensors 23, nr 4 (15.02.2023): 2197. http://dx.doi.org/10.3390/s23042197.
Pełny tekst źródłaKato, Kaito, Hideyuki Kato, Hiroyuki Asahara, Daisuke Ito i Takuji Kousaka. "Effects on random early detection of the packet drop probability function with an adjustable nonlinearity". Nonlinear Theory and Its Applications, IEICE 14, nr 2 (2023): 193–206. http://dx.doi.org/10.1587/nolta.14.193.
Pełny tekst źródłaSospeter, John, Di Wu, Saajid Hussain i Tesfanesh Tesfa. "An Effective and Efficient Adaptive Probability Data Dissemination Protocol in VANET". Data 4, nr 1 (21.12.2018): 1. http://dx.doi.org/10.3390/data4010001.
Pełny tekst źródłaShanmugam, Kannan, Karthik Subburathinam i Arunachalam Velayuthampalayam Palanisamy. "A Dynamic Probabilistic Based Broadcasting Scheme for MANETs". Scientific World Journal 2016 (2016): 1–8. http://dx.doi.org/10.1155/2016/1832026.
Pełny tekst źródłaBagali, Sheetal, i Ramakrishnan Sundaraguru. "Distributed resource allocation model with presence of multiple jammer for underwater wireless sensor networks". Indonesian Journal of Electrical Engineering and Computer Science 30, nr 2 (1.05.2023): 1002. http://dx.doi.org/10.11591/ijeecs.v30.i2.pp1002-1010.
Pełny tekst źródłaHassan, Samuel O., Adewole U. Rufai, Michael O. Agbaje, Theophilus A. Enem, Lukman A. Ogundele i Suleiman A. Usman. "Improved random early detection congestion control algorithm for internet routers". Indonesian Journal of Electrical Engineering and Computer Science 28, nr 1 (1.10.2022): 384. http://dx.doi.org/10.11591/ijeecs.v28.i1.pp384-395.
Pełny tekst źródłaAvrachenkov, Kostia, i Uri Yechiali. "RETRIAL NETWORKS WITH FINITE BUFFERS AND THEIR APPLICATION TO INTERNET DATA TRAFFIC". Probability in the Engineering and Informational Sciences 22, nr 4 (25.09.2008): 519–36. http://dx.doi.org/10.1017/s0269964808000314.
Pełny tekst źródłaBazmi, Parisa, i Manijeh Keshtgary. "A NEURAL NETWORK BASED TRAFFIC-AWARE FORWARDING STRATEGY IN NAMED DATA NETWORKING". IIUM Engineering Journal 17, nr 2 (30.11.2016): 59–69. http://dx.doi.org/10.31436/iiumej.v17i2.617.
Pełny tekst źródłaAmit Kumar Bindal, Kunal Goel,. "Dynamic Scheduler for WSN Applications in Precision Agriculture". Mathematical Statistician and Engineering Applications 71, nr 2 (11.05.2022): 390–98. http://dx.doi.org/10.17762/msea.v71i2.100.
Pełny tekst źródłaSong, Jia Jia, i Zhi Xue Zhang. "Research on the Improvement of RED Algorithm in Network Congestion Control". Applied Mechanics and Materials 713-715 (styczeń 2015): 2471–77. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2471.
Pełny tekst źródłaHassan, Samuel Oluwatosin, Adewole Usman Rufai, Vivian Ogochukwu Nwaocha, Samson Ojo Ogunlere, Aderonke Adelola Adegbenjo, Michael Olugbenga Agbaje i Theophilus Aniemeka Enem. "Quadratic exponential random early detection: a new enhanced random early detection-oriented congestion control algorithm for routers". International Journal of Electrical and Computer Engineering (IJECE) 13, nr 1 (1.02.2023): 669. http://dx.doi.org/10.11591/ijece.v13i1.pp669-679.
Pełny tekst źródłaGiri, Sovanjyoti, i Rajarshi Roy. "On NACK-Based rDWS Algorithm for Network Coded Broadcast". Entropy 21, nr 9 (17.09.2019): 905. http://dx.doi.org/10.3390/e21090905.
Pełny tekst źródłaSarkar, Nurul I., Roman Ammann i Salahuddin Muhammad Salim Zabir. "Analyzing TCP Performance in High Bit Error Rate Using Simulation and Modeling". Electronics 11, nr 14 (19.07.2022): 2254. http://dx.doi.org/10.3390/electronics11142254.
Pełny tekst źródłaSuma, P., O. Nagaraju i Md Ali Hussain. "Node Disjoint Random and Optimal Path Selection (NDROPS) Algorithm for Security in MANETS". International Journal of Electrical and Computer Engineering (IJECE) 7, nr 3 (1.06.2017): 1197. http://dx.doi.org/10.11591/ijece.v7i3.pp1197-1203.
Pełny tekst źródłaBharathi, L., N. Sangeethapriya, S. Dola Sanjay, R. Durgaprasad i Y. Lavanya. "An Improved Link Stability Based on Swift Exploring Packet Ratio Using Expected Time Matrix in Wireless Sensor Network". Journal of Computational and Theoretical Nanoscience 17, nr 12 (1.12.2020): 5528–34. http://dx.doi.org/10.1166/jctn.2020.9449.
Pełny tekst źródłaChumchu, Prawit, Roksana Boreli i Aruna Seneviratne. "A Model-based Scalable Reliable Multicast Transport Protocol for Satellite Networks". Journal of Communications Software and Systems 1, nr 1 (6.04.2017): 24. http://dx.doi.org/10.24138/jcomss.v1i1.313.
Pełny tekst źródłaLim, Sangsoon. "IACR: an interference-aware channel reservation for wireless sensor networks". International Journal of Electrical and Computer Engineering (IJECE) 9, nr 2 (1.04.2019): 1220. http://dx.doi.org/10.11591/ijece.v9i2.pp1220-1225.
Pełny tekst źródłaTabash, I. K., M. A. Mamun i A. Negi. "A Fuzzy Logic Based Network Congestion Control Using Active Queue Management Techniques". Journal of Scientific Research 2, nr 2 (26.04.2010): 273–84. http://dx.doi.org/10.3329/jsr.v2i2.2786.
Pełny tekst źródłaAbu-Shareha, Ahmad Adel, Basil Al-Kasasbeh, Qusai Y. Shambour, Mosleh M. Abualhaj i Sumaya N. Al-Khatib. "Fuzzy Comprehensive Random Early Detection of Router Congestion". Information Technology and Control 51, nr 2 (23.06.2022): 252–67. http://dx.doi.org/10.5755/j01.itc.51.2.30194.
Pełny tekst źródłaTiwari, Ranjeet Kumar, Shovan Bhaumik, Paresh Date i Thiagalingam Kirubarajan. "Particle Filter for Randomly Delayed Measurements with Unknown Latency Probability". Sensors 20, nr 19 (6.10.2020): 5689. http://dx.doi.org/10.3390/s20195689.
Pełny tekst źródłaZhou, Qizhao, Junqing Yu i Dong Li. "An Adaptive Authenticated Model for Big Data Stream SAVI in SDN-Based Data Center Networks". Security and Communication Networks 2021 (21.09.2021): 1–14. http://dx.doi.org/10.1155/2021/5451820.
Pełny tekst źródłaSubathra, P., S. Sivagurunathan i N. Ramaraj. "Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks". International Journal of Business Data Communications and Networking 6, nr 1 (styczeń 2010): 38–57. http://dx.doi.org/10.4018/jbdcn.2010010103.
Pełny tekst źródłaTung, K. L., Y. L. Chang, J. Y. Lai, C. H. Chang i C. J. Chuang. "A CFD study of the deep bed filtration mechanism for submicron/nano-particle suspension". Water Science and Technology 50, nr 12 (1.12.2004): 255–64. http://dx.doi.org/10.2166/wst.2004.0721.
Pełny tekst źródłaCetinkaya, Ahmet, Hideaki Ishii i Tomohisa Hayakawa. "An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses". Entropy 21, nr 2 (22.02.2019): 210. http://dx.doi.org/10.3390/e21020210.
Pełny tekst źródłaManfredi, Luciano, i Jonas Mureika. "Horizon Wavefunction of Generalized Uncertainty Principle Black Holes". Advances in High Energy Physics 2016 (2016): 1–8. http://dx.doi.org/10.1155/2016/1543741.
Pełny tekst źródłaR. Rohini i K. Krishnan. "Analysis of Two-Echelon Inventory System with Two Demand Classes with Partial Backlogging". International Journal of Fuzzy Mathematical Archive 15, nr 02 (2018): 137–47. http://dx.doi.org/10.22457/ijfma.v15n2a4.
Pełny tekst źródłaRehman, Ghani Ur, Muhammad Zubair, Iqbal Qasim, Afzal Badshah, Zafar Mahmood, Muhammad Aslam i Syeda Fizah Jilani. "EMS: Efficient Monitoring System to Detect Non-Cooperative Nodes in IoT-Based Vehicular Delay Tolerant Networks (VDTNs)". Sensors 23, nr 1 (22.12.2022): 99. http://dx.doi.org/10.3390/s23010099.
Pełny tekst źródłaQuadir, Md Abdul, J. Christy Jackson, J. Prassanna, K. Sathyarajasekaran, K. Kumar, H. Sabireen, Shivam Ubarhande i V. Vijaya Kumar. "An efficient algorithm to detect DDoS amplification attacks". Journal of Intelligent & Fuzzy Systems 39, nr 6 (4.12.2020): 8565–72. http://dx.doi.org/10.3233/jifs-189173.
Pełny tekst źródłaSingh, Preeti, J. K. Rai i Ajay K. Sharma. "Hybrid buffer and AWG based add-drop optical packet switch". Journal of Optical Communications, 12.07.2021. http://dx.doi.org/10.1515/joc-2021-0058.
Pełny tekst źródłaMohammad Sirajuddin i Dr. B. Sateesh Kumar. "Mitigation of Black Hole and Selective Forwarding Attacks through Active Trust Mechanisms in Wireless Sensor Networks". International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 10.05.2023, 329–37. http://dx.doi.org/10.32628/cseit2390395.
Pełny tekst źródłaNobahari, Ainaz, i Seyed Javad Mirabedini. "DSVL: Detecting Selfish Node In Vehicular Ad-hoc Networks (VANET) by Learning Automata". DSVL: Detecting Selfish Node In Vehicular Ad-hoc Networks (VANET) by Learning Automata, 2.08.2021, 1–28. http://dx.doi.org/10.32908/ahswn.v53.7989.
Pełny tekst źródłaGhazvini, Mahdieh, Naser Movahedinia i Kamal Jamshidi. "A Game Theory based Contention Window Adjustment for IEEE 802.11 under Heavy Load". International Journal of Communication Networks and Information Security (IJCNIS) 5, nr 2 (17.04.2022). http://dx.doi.org/10.17762/ijcnis.v5i2.293.
Pełny tekst źródłaAlese, Boniface Kayode, Bamidele Moses Kuboye i Omolara Iyabode Alabede. "Development of Recovery and Redundancy Model for Real Time Wireless Networks". Journal of Computer Science Research 4, nr 3 (31.08.2022). http://dx.doi.org/10.30564/jcsr.v4i3.4915.
Pełny tekst źródłaUgwu, Godwin Onyekachi, Udora Nwabuoku Nwawelu, Mamilus Aginwa Ahaneku i Cosmas Ikechukwu Ani. "Effect of service differentiation on QoS in IEEE 802.11e enhanced distributed channel access: a simulation approach". Journal of Engineering and Applied Science 69, nr 1 (4.01.2022). http://dx.doi.org/10.1186/s44147-021-00055-3.
Pełny tekst źródła