Search Results - network using tools
Search alternatives:
- using tools »
-
1
Developing Networking Tracking Tools for Eliminating Spoofing in Local Area Network
Published 2009“…This study used MYSQL and JCreator for developing the tracking tools for spoofing over local area network. …”
Get full text
Get full text
Get full text
Thesis -
2
Experimental analysis of passive bandwidth estimation tool for multiple hop wireless networks
Published 2013“…This research willrepresent an experimental analysis of available bandwidth by using passive bandwidth estimation tool. The passive bandwidth estimation tools that were used were Pathload, Pathrate and Wbest. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Experimental Analysis on Active Bandwidth Estimation Tools for Mesh Wireless Local Area Network (WLAN)
Published 2013“…Available bandwidth estimation is useful for route selection in a network environment. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Packet sniffing system / Chan Hai Chai
Published 2005“…It is a useful tool for network administrator and network engineer to monitoring the network traffic. …”
Get full text
Get full text
Thesis -
5
Experimental analysis on passive bandwidth estimation tools for iperf, netperf and spruce for mesh wireless local area network (WLAN)
Published 2014“…Available bandwidth estimation is useful for route selection in a network environment. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Auto-check network reporting tool (ACNR): network monitoring / Ahmad Fakhriy Che Ariffin
Published 2013“…Python is one of the powerful programming languages to create a network tools. Besides that, this project use Qt software as GUI tool development. …”
Get full text
Get full text
Thesis -
7
Personal home network intrusion checking tool (PacAN)
Published 2021“…This tool is able to reduce the risk of intrusion and attacks of home networks as well as providing a compact option that eliminates the users’ need to use multiple tools.…”
Get full text
Get full text
Get full text
Other -
8
Web-Based Network Device Monitoring Tool Using Simple Network Management Protocol (Snmp)
Published 2003“…The network device monitoring tool is configured to collect network statistical data. …”
Get full text
Get full text
Thesis -
9
Development of home network sustainable interface tools
Published 2019“…Its interface is complex, and does not address the home user's needs in their daily use. This paper presents an interactive network management tool, which emphasizes support features for home network users. …”
Get full text
Get full text
Get full text
Article -
10
Optimization of tool life using in milling using radial basis function network
Published 2010“…This paper discuss of the Optimization of tool life in milling using Radial basis Function Network (RBFN).Response Surface Methodology (RSM) and Neural Network implemented to model the end milling process that are using high speed steel coated HS-Co as the cutting tool and aluminium alloy T6061 as material due to predict the resulting of flank wear. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Experimental analysis on active bandwidth estimation tools for clink, bing, stab for mesh wireless local area network
Published 2014“…WLAN offers wireless network communication over short distances using radio or infrared signals instead of using traditional network cabling. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Performance improvement in end-to-end bandwidth estimation tool in wireless local area network (WLAN)
Published 2018“…However, these tools are not fully tested in various network environment and benchmark with existing widely used ABW tools. …”
Get full text
Get full text
Research Report -
13
Security mechanism in computer network environment: A study of adoption status in Malaysian company
Published 2009“…Based on the tools adopted, most of the companies are using common network security tool such as antivirus as their main protection for their computers. …”
Get full text
Get full text
Article -
14
Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali
Published 2005“…This project is using a honeypot as a tool to detect internal network attack at Faculty of Information Technology and Quantitative Science, (FTMSK). …”
Get full text
Get full text
Thesis -
15
Simulation tools for mobile ad-hoc sensor networks: A state-of-the-art survey
Published 2013“…Therefore, it is more economical and practical to use simulation tools to simulate MASNETs applications. …”
Get full text
Get full text
Get full text
Article -
16
Development of geographical information tools in road realignment for oil palm plantation
Published 2019“…When the tool was completed, T-test analysis was done to evaluate the effectiveness of the developed tool using several sets of the road network.…”
Get full text
Get full text
Thesis -
17
Stock market equity advisory tool by using of neural network method
Published 2024“…This field of study of this project is a stock market equity advisory tool that will analyze the stock market using machine learning which is Neural Network Method. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Prediction of tool wear and surface roughness of waspaloy by using Artificial Neural Network (ANN)
Published 2021“…This research focuses on prediction on tool wear and surface roughness of Waspaloy under different machining conditions by using artificial neural network (ANN). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Local area network (LAN) cable tester using arduino
Published 2014“…The purpose of this project is to build a network test tool that has an LCD and cheap but the specifications are similar to network test tools are expensive. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Packet sniffer & analyzer / Ong Khoon Kok
Published 2000“…Sniffer has the great potential to further develop for more powerful tools like network monitor, security tools or scanning tools that are intelligent to report an alert to human or automatically take the right action to prevent a certain threat for the network without intervention by humans or at least with minimum human loads. …”
Get full text
Get full text
Thesis
