Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
This paper describes a version of the fast optimization method (FOM) used to estimate the Hurst parameter (H) with appropriate window sizes in self-similar network traffic. Large or short window sizes, for example, may cause the results to become unreliable. Estimating window sizes requires that th...
| Main Authors: | Idris, Mohd. Yazid, Abdullah, Abdul Hanan, Maarof, Mohd. Aizaini |
|---|---|
| Format: | Article |
| Published: |
Taru Publications, New Delhi
2007
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/5032/ |
Similar Items
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
The sign tale of hurst parameter: a revisit
by: Salleh, Mazleena, et al.
Published: (2007)
by: Salleh, Mazleena, et al.
Published: (2007)
The sign tale of hurst parameter : a revisit
by: Salleh, Mazleena, et al.
Published: (2007)
by: Salleh, Mazleena, et al.
Published: (2007)
Comparison of TCP Variants Over Self-Similar Traffic
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
Performance of transmission control protocol on self-similar traffic.
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
Simulating self-similar vbr traffic / Malini Subramaniam
by: Malini, Subramaniam
Published: (2004)
by: Malini, Subramaniam
Published: (2004)
Uncovering anomaly traffic based on loss of self-similarity behavior using second order statistical model
by: Rohani, M. F., et al.
Published: (2007)
by: Rohani, M. F., et al.
Published: (2007)
Self-similar network traffic using Successive Random Addition (SRA) algorithm / Hani Hamira Harun
by: Harun, Hani Hamira
Published: (2006)
by: Harun, Hani Hamira
Published: (2006)
Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini
by: Saarini, Jumaliah
Published: (2006)
by: Saarini, Jumaliah
Published: (2006)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Generation of self similar network traffic using DFGN algorithm / Che Ku Noreymie Che Ku Jusoh
by: Che Ku Jusoh, Che Ku Noreymie
Published: (2006)
by: Che Ku Jusoh, Che Ku Noreymie
Published: (2006)
A generator of cauchy-distributed time series with specific Hurst index
by: Estrada-Vargas, Leopoldo, et al.
Published: (2011)
by: Estrada-Vargas, Leopoldo, et al.
Published: (2011)
Analysis of malicious traffic and its impact to QoS metric LRD and energy invariant
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
Simulating rubber prices under geometric fractional Brownian motion with different Hurst estimators
by: Balasubramaniam, Srivennila Sri, et al.
Published: (2023)
by: Balasubramaniam, Srivennila Sri, et al.
Published: (2023)
Windows explorer
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Windows installation
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Window size and round-trip-time in a network transmission session
by: Ibrahim, Adamu Abubakar, et al.
Published: (2018)
by: Ibrahim, Adamu Abubakar, et al.
Published: (2018)
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
by: Shayau, Yazid Haruna
Published: (2018)
by: Shayau, Yazid Haruna
Published: (2018)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Cryptanalysis using biological inspired computing approaches
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Avalanche Analysis of Extended Feistel Network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Forensics visualization of Windows 10 registry
by: Awang, Muhamad Safwan
Published: (2019)
by: Awang, Muhamad Safwan
Published: (2019)
Unsupervised monocular depth estimation with multi-scale structural similarity powered loss function / Ali Kohan
by: Ali, Kohan
Published: (2020)
by: Ali, Kohan
Published: (2020)
Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm
by: Abubakar, Adamu, et al.
Published: (2016)
by: Abubakar, Adamu, et al.
Published: (2016)
Analysis of vehicle density estimation for traffic congestion in VANET / Mohamad Afiq Abu Bakar
by: Abu Bakar, Mohamad Afiq
Published: (2019)
by: Abu Bakar, Mohamad Afiq
Published: (2019)
Development of optimum window size in tropical climate using computational fluid dynamics and experimental works
by: Wahhad, Ali Mohamad
Published: (2016)
by: Wahhad, Ali Mohamad
Published: (2016)
Rated window method and packet size differentiation scheme for TCP fairness in IEEE 802.11 WLAN
by: Rasul, Tareq
Published: (2011)
by: Rasul, Tareq
Published: (2011)
Image retrieval based on similarity score fusion
by: Mohd. Ali, Iliana
Published: (2007)
by: Mohd. Ali, Iliana
Published: (2007)
Modeling and performance evaluation of self-similar behavior of MPEG-4 video traffic generators
by: Mohamed Abdelaziz, Izzeldin Ibrahim
Published: (2006)
by: Mohamed Abdelaziz, Izzeldin Ibrahim
Published: (2006)
Customer self-ordering system in fast food restaurant
by: Chik, Soon Wai
Published: (2011)
by: Chik, Soon Wai
Published: (2011)
The study of probability model for compound similarity searching
by: Salim, Naomie, et al.
Published: (2006)
by: Salim, Naomie, et al.
Published: (2006)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
Fast sub-window search with square shape
by: Liang, Antoni, et al.
Published: (2011)
by: Liang, Antoni, et al.
Published: (2011)
Predictive data mining based on similarity and clustering methods.
by: Defit, Sarjon, et al.
Published: (2000)
by: Defit, Sarjon, et al.
Published: (2000)
Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov Models
by: Toral-Cruz, Homero, et al.
Published: (2012)
by: Toral-Cruz, Homero, et al.
Published: (2012)
Similar Items
-
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004) -
The sign tale of hurst parameter: a revisit
by: Salleh, Mazleena, et al.
Published: (2007) -
The sign tale of hurst parameter : a revisit
by: Salleh, Mazleena, et al.
Published: (2007) -
Comparison of TCP Variants Over Self-Similar Traffic
by: Salleh, Mazleena, et al.
Published: (2005) -
Performance of transmission control protocol on self-similar traffic.
by: Salleh, Mazleena, et al.
Published: (2005)