Comparative Study on the Performance of Different TCP Flavors
Indeed the Transmission Control Protocol (TCP) is the main transport layer protocol for the end-to-end control that helps the creation of information communication. Most of today`s Internet applications depend on the Performance TCP simply because the most frequently used networks by today are the...
| Main Author: | Jama Omar Abdi, Abdulaziz |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/1599/1/ABDULAZIZ_JAMA_OMAR_ABDI.pdf https://etd.uum.edu.my/1599/2/1.ABDULAZIZ_JAMA_OMAR_ABDI.pdf https://etd.uum.edu.my/1599/ |
| Abstract | Abstract here |
Similar Items
Comparative Study on the Performance of Different TCP Flavors
by: Oumer, Abduaziz Jama
Published: (2009)
by: Oumer, Abduaziz Jama
Published: (2009)
Application Software Maintenance Process : A Comparative Study
by: Suhana, Saidin
Published: (2004)
by: Suhana, Saidin
Published: (2004)
Comparing the Performances of Neural Network and Rough Set Theory to Reflect the Improvement of Prognostic in Medical Data
by: Nur Aniza, Alang Ismail
Published: (2009)
by: Nur Aniza, Alang Ismail
Published: (2009)
Traveling Using Mass Rapid System : A Comparative Study Of Blind Searching Strategies
by: Syed Nidzamuddin, Syed Hassan
Published: (2008)
by: Syed Nidzamuddin, Syed Hassan
Published: (2008)
Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
by: Norkhushaini, Awang
Published: (2004)
by: Norkhushaini, Awang
Published: (2004)
Investigating the Impact of Different Representations of Data on Neural Network and Regression
by: Fallah, Ehab A. Omer El
Published: (2008)
by: Fallah, Ehab A. Omer El
Published: (2008)
Design and development of skin detection model based deep learning on different skin tones
by: Al-Qaysi, Mohammed Ahmed Chyad
Published: (2021)
by: Al-Qaysi, Mohammed Ahmed Chyad
Published: (2021)
The Impact of Normalization Techniques on Performance Backpropagation Networks
by: Norlida, Hassan
Published: (2004)
by: Norlida, Hassan
Published: (2004)
Visualizing Student Performances Using Data Mining Techniques.
by: Sri Banu, Munisamy
Published: (2007)
by: Sri Banu, Munisamy
Published: (2007)
Data Mining Classification Techniques and Performances on Medical Data
by: Benyehmad, Yahyia Mohammed M. Ali
Published: (2006)
by: Benyehmad, Yahyia Mohammed M. Ali
Published: (2006)
Performance Comparison of Parallel Bees Algorithm on Rosenbrock Function
by: Hammash, Nayif Mohammed
Published: (2012)
by: Hammash, Nayif Mohammed
Published: (2012)
Design Mobile Guide For Tioman Island.
by: Alfughi, Ahmed Omar
Published: (2008)
by: Alfughi, Ahmed Omar
Published: (2008)
Analisis penyumbang terhadap amalan pengintegrasian ICT dalam kalangan guru sekolah rendah
by: Muhammad Ismail Omar
Published: (2016)
by: Muhammad Ismail Omar
Published: (2016)
Evaluation of Car Rental Reservation/Management System with
Tracking Capability Performance
by: El-Shahawi, Fathi Ali
Published: (2009)
by: El-Shahawi, Fathi Ali
Published: (2009)
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
by: Shuwandy, Moceheb Lazam
Published: (2012)
by: Shuwandy, Moceheb Lazam
Published: (2012)
A Web-Based Interface For A High Performance Computing System
by: Awad, Mohammed M. I.
Published: (2008)
by: Awad, Mohammed M. I.
Published: (2008)
The Impact of Missing Value Methods and Normalization Techniques on the Performance of Data Mining Models
by: Munirah, Yahya
Published: (2011)
by: Munirah, Yahya
Published: (2011)
Modeling Primary School Student Academic Performance Using Data Mining Technique
by: Muhamad, Mat Yaacub
Published: (2011)
by: Muhamad, Mat Yaacub
Published: (2011)
Query Performance of CORBA Trading Object Service Using LDAP As Backend Storage
by: Farkhana, Muchtar
Published: (2007)
by: Farkhana, Muchtar
Published: (2007)
Tasks and User Performance Improvement for UUM Online Payment Using Key Stroke Level Model
by: Al-tawalbeh, Manal Ata
Published: (2009)
by: Al-tawalbeh, Manal Ata
Published: (2009)
Web-Based PC Loan Management For UUM Bursary
by: Shahrooj, Ahmad Omar Saleh
Published: (2008)
by: Shahrooj, Ahmad Omar Saleh
Published: (2008)
Study Room Online Reservation in UUM Library
by: Salah, Razwan Mohmed
Published: (2009)
by: Salah, Razwan Mohmed
Published: (2009)
Data Integration Case Study for UUM ASIS Student's Marks
by: Al-Badareen, Anas Bassam
Published: (2008)
by: Al-Badareen, Anas Bassam
Published: (2008)
Arabic Language Online Learning System
by: Omar, Ei Shibani Mohamed R.
Published: (2008)
by: Omar, Ei Shibani Mohamed R.
Published: (2008)
Designing a Neural Network Based Audio Classification System
by: Khaled Abdal Gader, Mohamed Omar
Published: (2004)
by: Khaled Abdal Gader, Mohamed Omar
Published: (2004)
A Study on Network Infrastructure Requirement for Kubang Pasu Land Office
by: Syarifah Adilah, Mohamed Yusoff
Published: (2004)
by: Syarifah Adilah, Mohamed Yusoff
Published: (2004)
Improvement to the Appointment System for Clinic: A Case Study in UUM Clinic
by: Hamouda, Shady M.S.
Published: (2008)
by: Hamouda, Shady M.S.
Published: (2008)
An Effectiveness Study Of Implementing Panoramic View Website To Promote Tourism In Phuket Island
by: Rosini, Sanmut
Published: (2008)
by: Rosini, Sanmut
Published: (2008)
Requirement Model for Web Based Customer Ordering System - Segar Mart as Case Study
by: Geblawi, Bashir M. Mohamed
Published: (2006)
by: Geblawi, Bashir M. Mohamed
Published: (2006)
The Challenges Of Understanding Security In Web Browser Case Study: Internet Explorer And Mozilla Firefox
by: Saleh, Ashraf Mousa
Published: (2008)
by: Saleh, Ashraf Mousa
Published: (2008)
Mobile and Web-Based Entry Requirement Checking Expert System For Postgraduate Studies in UUM. (ERCES).
by: Alkayyal, Tareq D. T.
Published: (2007)
by: Alkayyal, Tareq D. T.
Published: (2007)
Healthcare Business Intelligence: A Case Study of Universiti Utara Malaysia Health Center (PKU)
by: Ishola, Muraina Dada
Published: (2011)
by: Ishola, Muraina Dada
Published: (2011)
Develop an Online Booking System for Graduate Studies at King Faisal University Meeting and Seminar Rooms
by: Mohammed, Fakhrani Hesham
Published: (2011)
by: Mohammed, Fakhrani Hesham
Published: (2011)
Evaluation of Information Security Risks of E-Learning Systems: A Case Study on UUM Learning Zone
by: Tan, Wai Beng
Published: (2011)
by: Tan, Wai Beng
Published: (2011)
A Study on the Use of Computerised Accounting Systems in Small Business: A Case of Small Business in Libya
by: Saleh, Saleh Abdullah
Published: (2011)
by: Saleh, Saleh Abdullah
Published: (2011)
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
by: Hazzaimeh, Yousef Abd-AlMohdi
Published: (2008)
by: Hazzaimeh, Yousef Abd-AlMohdi
Published: (2008)
Graduate Entrepreneur Analytical Reports (GEAR) Using Data Warehouse Model: A Case Study at CEDI, UUM
by: Khraibet, Hayder Naser
Published: (2011)
by: Khraibet, Hayder Naser
Published: (2011)
Design an Online School Communication System: A Case Study of Malaysian School (Sekolah Kebangsaan Bandar Baru Sintok)
by: Alkafagi, Alaa A
Published: (2011)
by: Alkafagi, Alaa A
Published: (2011)
Establishing Conducive Environment For Better Software Development Process : A Study On The Integraded Cargo Community Clearance Application (ICCCA) Project
by: Tan, Sim Yong
Published: (2002)
by: Tan, Sim Yong
Published: (2002)
A Prototype of Online Form One Student Registration System: A Case Study in SMKA Al-Mashoor (Lelaki) Pulau Pinang
by: Norafizah, Abdul Razak
Published: (2011)
by: Norafizah, Abdul Razak
Published: (2011)
Similar Items
-
Comparative Study on the Performance of Different TCP Flavors
by: Oumer, Abduaziz Jama
Published: (2009) -
Application Software Maintenance Process : A Comparative Study
by: Suhana, Saidin
Published: (2004) -
Comparing the Performances of Neural Network and Rough Set Theory to Reflect the Improvement of Prognostic in Medical Data
by: Nur Aniza, Alang Ismail
Published: (2009) -
Traveling Using Mass Rapid System : A Comparative Study Of Blind Searching Strategies
by: Syed Nidzamuddin, Syed Hassan
Published: (2008) -
Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
by: Norkhushaini, Awang
Published: (2004)