Search Results - (( _ distribution a algorithm ) OR ( parameter communication based algorithm ))

Refine Results
  1. 1

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Spectrum aware clustering algorithm based on fuzzy logic for sensor based monitoring application / Noorhayati Mohamed Noor …[et al.] by Mohamed Noor, Noorhayati, Md Din, Norashidah, Kasiran, Zolidah, Khalid, Nor Azimah, Abdullah, Shapina

    Published 2020
    “…The cluster heads (CHs) are selected according to the channel availability, residual energy, communication cost and node distribution parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Process management is a fundamental problem in distributed systems. It is fast becoming a major performance and design issue for concurrent programming on modern architectures and for the design of distributed systems. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Chaos search in fourire amplitude sensitivity test by Koda, Masato

    Published 2012
    “…Work in Artificial Intelligence (AI) often involves search algorithms. In many complicated problems, however, local search algorithms may fail to converge into global optimization and global search procedures are needed. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Time-Frequency Analysis of FSK Digital Modulation Signals using the Smooth Lag-Windowed Wigner-Ville Distribution. by Sha'ameri, Ahmad Zuri

    Published 2003
    “…The algorithm generates the time-frequency representation directly based on the signal characteristics. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Ant system with heuristics for capacitated vehicle routing problem by Tan, Wen Fang

    Published 2013
    “…As a result, the ASH algorithm is a viable alternative for addressing the CVRP with satisfactory solution quality and run time.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Efficient back-off mechanism for multimedia support in IEEE 802.11E by Al-Nuaimi, Aws Ali Shakir

    Published 2012
    “…The current research proposes a new algorithm so-called Dynamic Fast Adaptation of back-off algorithm for contention-based EDCA (DFA-EDCA) mechanism. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Enhancing quality of service in Multi-Radio Multi-Channel Wireless Mesh Networks by Raja Bongsu, Raja Hasyifah

    Published 2023
    “…The Priority-based Minimum Interference Channel Assignment (PRIMICA) algorithm is introduced to address this issue. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Chaos Search in Fourier Amplitude Sensitivity Test by Koda, Masato

    Published 2012
    “…FAST was originally developed based on the Fourier series expansion of a model output and on the assumption that samples of model inputs are uniformly distributed in a high dimensional parameter space. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Nature-Inspired Drone Swarming for Wildfires Suppression Considering Distributed Fire Spots and Energy Consumption by Alsammak I.L.H., Mahmoud M.A., Gunasekaran S.S., Ahmed A.N., Alkilabi M.

    Published 2024
    “…To achieve this goal, we used the improved random walk algorithm to explore the distributed fire spots and a self-coordination mechanism based on the stigmergy as an indirect communication between the swarm drones, taking into account the collision avoidance factor, the amount of extinguishing fluid, and the flight range of the drones. …”
    Article
  18. 18
  19. 19

    Resourceful residual energy consumption in TDMA scheduling for IoT-based wireless sensor network by Rahiman, Amir Rizaan, Islam, Md Ashikul, Derahman, Md. Noor

    Published 2019
    “…Moreover, the numbers of neighbors and the network residual energy have been proved both nodes execution time and energy utilization can be reduced in the algorithm. The algorithm performance has been evaluated based on the previous experiment parameters with new high-speed data link. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks by Han, Fengrong

    Published 2022
    “…Accordingly, this study aspires to bridge the research gap by exploring a new DV-Hop algorithm to build a fast, costefficient, strong range-free localization scheme. …”
    Get full text
    Get full text
    Thesis