Implementing traffic conditioner using token bucket and leaky bucket / Chia Kai Yan
Since network is expanding from time to time, therefore network simulator is required as a tool investigate performance of the network effectively. Without building a real network the performance of the network can be analyzed. UMJaNetSim is a network simulator that provides graphical user interface...
| Main Author: | Chia , Kai Yan |
|---|---|
| Format: | Thesis |
| Published: |
2004
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/11066/ http://studentsrepo.um.edu.my/11066/1/Chia_Kai_Yan_(Implementing_Traffic).pdf |
Similar Items
The dimensioning of non-token-bucket parameters for efficient and reliable QoS routing decisions in bluetooth ad hoc network
by: Hasbullah, Halabi, et al.
Published: (2008)
by: Hasbullah, Halabi, et al.
Published: (2008)
Implementation of three colour marker in traffic conditioner for DIFFSERV Network Simulator / Lim Lee Wan
by: Lim , Lee Wan
Published: (2004)
by: Lim , Lee Wan
Published: (2004)
3D GUI / Foong Chia Ming
by: Foong , Chia Ming
Published: (2003)
by: Foong , Chia Ming
Published: (2003)
General electronic community / Yan Pei Sun
by: Yan , Pei Sun
Published: (2005)
by: Yan , Pei Sun
Published: (2005)
Analysis and design of intrusion detection system implementation / Chia Fook Keong
by: Chia, Fook Keong
Published: (2003)
by: Chia, Fook Keong
Published: (2003)
Branch credit information system (BCIS) / Cheong Kok Yan
by: Cheong , Kok Yan
Published: (2002)
by: Cheong , Kok Yan
Published: (2002)
Combined bearing capacity of bucket foundations in soft-over-stiff clay
by: Xia, Huxi, et al.
Published: (2022)
by: Xia, Huxi, et al.
Published: (2022)
Impact of Takeoff Angle of Bucket Type Energy Dissipater on Scour Hole
by: Nor Azlina, Alias, et al.
Published: (2008)
by: Nor Azlina, Alias, et al.
Published: (2008)
Impact of takeoff angle of bucket type energy dissipater on scour hole
by: Alias, Nor Azlina, et al.
Published: (2008)
by: Alias, Nor Azlina, et al.
Published: (2008)
Wellness portal: e-Mailing and charting module / Jaime Chia Wai Ling
by: Jaime Chia , Wai Ling
Published: (2003)
by: Jaime Chia , Wai Ling
Published: (2003)
Intrusion detection using artificial neural network / Gan Sze Kai
by: Gan , Sze Kai
Published: (2002)
by: Gan , Sze Kai
Published: (2002)
Web based agent for transaction of mercantile-security measures / Yan Wee Jing
by: Yan , Wee Jing
Published: (2001)
by: Yan , Wee Jing
Published: (2001)
The Decentralized Non-Fungible Token Exchange with Secure Connections
by: Sharath, M.S., et al.
Published: (2024)
by: Sharath, M.S., et al.
Published: (2024)
Numerical evaluation of contemporary excavator bucket designs using finite element analysis
by: Mughal, Khurram Hameed, et al.
Published: (2021)
by: Mughal, Khurram Hameed, et al.
Published: (2021)
A Study on Non-Fungible Tokens Marketplace for Secure Management
by: Rishabh, Singh, et al.
Published: (2024)
by: Rishabh, Singh, et al.
Published: (2024)
Evaluation of capacities of bucket foundations in soft-stiff-soft clays under combined loading
by: Yang, Ningxin, et al.
Published: (2021)
by: Yang, Ningxin, et al.
Published: (2021)
Holocene reef accretion on the Rodrigues carbonate platform: An alternative to the classic “bucket-fill” model
by: O'Leary, Mick, et al.
Published: (2010)
by: O'Leary, Mick, et al.
Published: (2010)
An enhanced anycast routing protocol using nearest PIM-SM tree distribution with load-balancing scheme / Jimmy Tan Kai Hong.
by: Tan, Jimmy Kai Hong
Published: (2003)
by: Tan, Jimmy Kai Hong
Published: (2003)
Implementation traffic control and traffic shaping in linux using web approach / Eric Ng Kang Yin
by: Eric Ng, Kang Yin
Published: (2004)
by: Eric Ng, Kang Yin
Published: (2004)
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
A Comparative Study Of Blockchain Algorithms For Non-Fungible Token
by: Woo, Jan Yin
Published: (2023)
by: Woo, Jan Yin
Published: (2023)
University of Malaya's electronic procurement system (UMEPS) Version 3.0 / Chia Wee Leng
by: Chia , Wee Leng
Published: (2001)
by: Chia , Wee Leng
Published: (2001)
Dr. Lee Chia Kuang invents new software Dematel Digraph
by: Safriza, Baharuddin, et al.
Published: (2021)
by: Safriza, Baharuddin, et al.
Published: (2021)
Dr. Lee Chia Kuang cipta perisian baharu Dematel Digraph
by: Safriza, Baharuddin, et al.
Published: (2021)
by: Safriza, Baharuddin, et al.
Published: (2021)
Cohesive token passing algorithm utilizing software agents
by: Abdulrazzak, A. Fua’ad, et al.
Published: (2010)
by: Abdulrazzak, A. Fua’ad, et al.
Published: (2010)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
Simulation of traffic signal using fuzzy logic
by: Wong, Wei Wei
Published: (2019)
by: Wong, Wei Wei
Published: (2019)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
KJ Fashion Shoes E-Commerce Mobile-Based Application with Implementation of Image Recognition System
by: Soh, Kai Jie
Published: (2022)
by: Soh, Kai Jie
Published: (2022)
Analysis of Traffic Accident Patterns Using Association Rule Mining
by: Yudy, Pranata, et al.
Published: (2024)
by: Yudy, Pranata, et al.
Published: (2024)
Network traffic monitoring system with approach (NTMs) / Lee Chin Han
by: Lee , Chin Han
Published: (2004)
by: Lee , Chin Han
Published: (2004)
Algorithm for enhancing the QoS of video traffic over wireless mesh networks
by: A. Moh, Abdul Nasser, et al.
Published: (2019)
by: A. Moh, Abdul Nasser, et al.
Published: (2019)
Intelligent traffic sign recognition system for autonomous vehicle navigation (ITSRS)
by: Law, Jia Swee
Published: (2018)
by: Law, Jia Swee
Published: (2018)
Data mining in network traffic using fuzzy clustering
by: Mohamad, Shamsul
Published: (2003)
by: Mohamad, Shamsul
Published: (2003)
Analysis of malicious traffic and its impact to QoS metric LRD and energy invariant
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
Traffic scheduling and link sharing mechanisms for controlled load service / Chin Yun Choong
by: Chin , Yun Choong
Published: (2000)
by: Chin , Yun Choong
Published: (2000)
Intelligent Air Conditioner System: Marketing Plan And Pricing Strategy.
by: Ching, Yee Khim
Published: (2009)
by: Ching, Yee Khim
Published: (2009)
Implementation of dynamic fuzzy logic control of traffic
light with accident detection and action system using iTraffic simulation
Simulation
by: Alkandari, Abdulrahman, et al.
Published: (2018)
by: Alkandari, Abdulrahman, et al.
Published: (2018)
The Simulation on Vehicular Traffic Congestion Using Discrete Event Simulation (DES): A Case Study
by: Noor Akma, Abu Bakar, et al.
Published: (2018)
by: Noor Akma, Abu Bakar, et al.
Published: (2018)
Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov Models
by: Toral-Cruz, Homero, et al.
Published: (2012)
by: Toral-Cruz, Homero, et al.
Published: (2012)
Similar Items
-
The dimensioning of non-token-bucket parameters for efficient and reliable QoS routing decisions in bluetooth ad hoc network
by: Hasbullah, Halabi, et al.
Published: (2008) -
Implementation of three colour marker in traffic conditioner for DIFFSERV Network Simulator / Lim Lee Wan
by: Lim , Lee Wan
Published: (2004) -
3D GUI / Foong Chia Ming
by: Foong , Chia Ming
Published: (2003) -
General electronic community / Yan Pei Sun
by: Yan , Pei Sun
Published: (2005) -
Analysis and design of intrusion detection system implementation / Chia Fook Keong
by: Chia, Fook Keong
Published: (2003)