Search Results - Computer network response

Refine Results
  1. 1

    Performance analysis of open-source network monitoring software in wireless network / Mohd Faris Mohd Fuzi ... [et al.] by Mohd Fuzi, Mohd Faris, Mohd Mahdzir, Mohd Firdaus, Abd Halim, Iman Hazwam, Ruslan, Rafiza

    Published 2023
    “…It is because network monitoring software can monitor behaviours, provide alertness for any failing component of a computer network, and measure performance such as CPU usage, bandwidth, throughput, response time, and packet loss. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Performance analysis of network monitoring software in wireless network / Mohd Firdaus Mohd Mahdzir by Mohd Mahdzir, Mohd Firdaus

    Published 2019
    “…Network monitoring software is a tools that are able to monitor the behaviours and provide alertness for any failing component of computer network. …”
    Get full text
    Get full text
    Research Reports
  3. 3
  4. 4
  5. 5

    Immune Inspired Approach for Securing Wireless Ad hoc Networks by Yasir Abdelgadir , Mohamed, Azween, Abdullah

    Published 2009
    “…Moreover, mobile ad hoc networks (MANETs) have no clear line of defense and no fixed infrastructure; therefore, the known security techniques used for cabled networks might not work perfectly. …”
    Get full text
    Get full text
    Article
  6. 6

    Immune Inspired Approach for Securing Wireless Ad hoc Networks by Yasir Abdelgadir , Mohamed, Azween, Abdullah

    Published 2009
    “…Moreover, mobile ad hoc networks (MANETs) have no clear line of defense and no fixed infrastructure; therefore, the known security techniques used for cabled networks might not work perfectly. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Optimizing workload allocation in a network of heterogeneous computers by Rahim, Rahela, Ku-Mahamud, Ku Ruhana

    Published 2011
    “…The allocation of workload to a network of computers is investigated.A new workload allocation model based on Generalized Exponential (GE) distribution is proposed for user level performance measures.The criterion used for effective workload allocation is the one that minimizes the expected response time in systems to which jobs are routed. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    CAD and fabrication of low-pass filter / Norazam Mohd Amin by Mohd Amin, Norazam

    Published 2004
    “…The filter was designed, simulated and optimized with the aid of a CAD package HP-Eesof and Genesys V8 with different typ of network. In Libra, the type of network used for the filter is 7t-network while T-network type is used in Genesys. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Response Option for Attacks Detected by Intrusion Detection System by Shahid, Anwar, Mohamad Fadli, Zolkipli, Aws Naser, Jaber, Jasni, Mohamad Zain, Zakira, Inayat, Odili, Julius Beneoluchi

    Published 2015
    “…In past decades, we have seen that the increasing speed of the network attacks compromising computer system functionality and degrading network performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A Divide-and-Distribute Approach to Single-Cycle Learning HGN Network for Pattern Recognition by Muhamad Amin , Anang Hudaya, Khan, Asad I.

    Published 2010
    “…This paper investigates an effect of dividing and distributing simple pattern recognition processes within a computational network. Our approach extends the single-cycle pattern recognition capability of Hierarchical Graph Neuron (HGN) for wireless sensor networks into the more generic framework of computational grids. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20

    Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia by Shaari, Muhammad Shakirin, Puteh, Nurnasran, Hassan, Suhaidi

    Published 1996
    “…The advancement and proliferation of computer networks nowadays have prompted for a concern on the issue of security of the whole network operation. …”
    Get full text
    Get full text
    Get full text
    Monograph