Minufiya University

Displaying 1-6 of 6 results

  • White Papers // Nov 2012

    A Modified Congestion Control Algorithm for Evaluating High BDP Networks

    It is well-known that the TCP congestion control algorithm has been remarkably successful in improving the current TCP/IP function better and efficiently. However, it can perform poorly in networks with high Bandwidth Delay Product (BDP) paths. This paper presents modification to a congestion control algorithm that may help the TCP...

    Provided By Minufiya University

  • White Papers // Nov 2012

    Cognitive Radio Networks with Best Relay Selection Method

    In this paper, the authors propose a cognitive transmission scheme with the best relay selection in a multiple-relay cognitive radio network to improve the secondary transmission performance while guaranteeing the Quality-of-Service (QoS) of the primary transmissions. They derive the closed-form expression of outage probability for the secondary transmissions, called Secondary...

    Provided By Minufiya University

  • White Papers // May 2010

    Evaluating the Performance of Symmetric Encryption Algorithms

    Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper...

    Provided By Minufiya University

  • White Papers // Jun 2009

    DCBOR: A Density Clustering Based on Outlier Removal

    Data clustering is an important data exploration technique with many applications in data mining. The authors present an enhanced version of the well known single link clustering algorithm. They will refer to this algorithm as DCBOR. The proposed algorithm alleviates the chain effect by removing the outliers from the given...

    Provided By Minufiya University

  • White Papers // Apr 2009

    Location Updating Strategies in Moving Object Databases

    Recent advances in wireless, communication systems have led to important new applications of Moving Object Databases (MOD). Typical application examples of Moving Object Databases (MOD) might include mobile computing, mobile E-Commerce, traffic police, taxi dispatchers and weather reporting services. The mobile computing capabilities allow users to manage their work while...

    Provided By Minufiya University

  • White Papers // Dec 2008

    Performance Evaluation of Symmetric Encryption Algorithms

    Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper...

    Provided By Minufiya University

  • White Papers // Dec 2008

    Performance Evaluation of Symmetric Encryption Algorithms

    Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper...

    Provided By Minufiya University

  • White Papers // Jun 2009

    DCBOR: A Density Clustering Based on Outlier Removal

    Data clustering is an important data exploration technique with many applications in data mining. The authors present an enhanced version of the well known single link clustering algorithm. They will refer to this algorithm as DCBOR. The proposed algorithm alleviates the chain effect by removing the outliers from the given...

    Provided By Minufiya University

  • White Papers // Apr 2009

    Location Updating Strategies in Moving Object Databases

    Recent advances in wireless, communication systems have led to important new applications of Moving Object Databases (MOD). Typical application examples of Moving Object Databases (MOD) might include mobile computing, mobile E-Commerce, traffic police, taxi dispatchers and weather reporting services. The mobile computing capabilities allow users to manage their work while...

    Provided By Minufiya University

  • White Papers // May 2010

    Evaluating the Performance of Symmetric Encryption Algorithms

    Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper...

    Provided By Minufiya University

  • White Papers // Nov 2012

    A Modified Congestion Control Algorithm for Evaluating High BDP Networks

    It is well-known that the TCP congestion control algorithm has been remarkably successful in improving the current TCP/IP function better and efficiently. However, it can perform poorly in networks with high Bandwidth Delay Product (BDP) paths. This paper presents modification to a congestion control algorithm that may help the TCP...

    Provided By Minufiya University

  • White Papers // Nov 2012

    Cognitive Radio Networks with Best Relay Selection Method

    In this paper, the authors propose a cognitive transmission scheme with the best relay selection in a multiple-relay cognitive radio network to improve the secondary transmission performance while guaranteeing the Quality-of-Service (QoS) of the primary transmissions. They derive the closed-form expression of outage probability for the secondary transmissions, called Secondary...

    Provided By Minufiya University