Search Results - (( _ evaluation ((bees algorithm) OR (new algorithm)) ) OR ( opnet simulation based algorithm ))

Refine Results
  1. 1

    Simulation model to improve QoS performance over fixed WiMAX using OPNET by Lawal, I.A., Md Said, A., Mu'azu, A.A.

    Published 2013
    “…The design has been evaluated using the simulation tool OPNET modeler 16.0. …”
    Get full text
    Get full text
    Article
  2. 2

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Optimization of process allocation causes to decrease the network traffic and fairer allocation, and therefore,optimization of fault-tolerance. The new protocol is simulated with using the OPNET and the MATLAB software. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Development Of Artificial Bee Colony (Abc) Variants And Memetic Optimization Algorithms by Sulaiman, Noorazliza

    Published 2017
    “…The modified ABC variants have been developed by inserting new processing stages into the standard ABC algorithm and modifying the employed-bees and onlooker-bees phases to balance out the exploration and exploitation capabilities of the algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons by Ghanem, Waheed Ali H. M., Aman, Jantan, Ahmed Ghaleb, Sanaa Abduljabbar, Naseer, Abdullah B.

    Published 2020
    “…However, the problem of improving the accuracy and efficiency of classification models remains open and yet to be resolved. This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Deterministic and stochastic inventory routing problems with backorders using artificial bee colony / Huda Zuhrah Ab Halim by Huda Zuhrah , Ab Halim

    Published 2019
    “…The performance of ABC is evaluated on existing datasets and compared with Scatter Search (SS) and Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A new algorithm for normal and large-scale optimization problems: Nomadic People Optimizer by Alsewari, Abdul Rahman Ahmed, Sinan, Q. Salih

    Published 2019
    “…For the comparison purpose, six well-established nature-inspired algorithms are performed for evaluating the robustness of NPO algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Broadening selection competitive constraint handling algorithm for faster convergence by Shaikh, T.A., Hussain, S.S., Tanweer, M.R., Hashmani, M.A.

    Published 2020
    “…The proposed algorithm has been evaluated using 24 benchmark functions. …”
    Get full text
    Get full text
    Article
  12. 12

    An event-driven simulation for highest urgency first (HUF) : a latency and modulation aware bandwidth allocation algorithm for WiMAX base stations. by Naghshbandi, Danial, Subramaniam, Shamala, Moghadam, Saeed Rahimi

    Published 2013
    “…This research has focused at developing a discrete-event simulator to implement bandwidth allocation algorithms for a WiMAX base station.The highest urgency first algorithm has been utilized as a benchmark deployment algorithm in order to provide: dynamic downlink/uplink adjustment and latency guarantee for real-time applications. …”
    Get full text
    Get full text
    Article
  13. 13

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Solving large-scale problems using multi-swarm particle swarm approach by Salih, Sinan Q., Alsewari, Abdulrahman A.

    Published 2018
    “…In the simulation part, several benchmark functions were performed with different numbers of dimensions. The proposed algorithm was tested on several test functions, with four different number of dimensions (100, 500, and 1000) it was evaluated in terms of performance efficiency and compared to standard PSO (SPSO), and mastersalve PSO algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Article
  16. 16

    Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Performance analysis of packets scheduling with preemptive / Norjanah Kastaman by Kastaman, Norjanah

    Published 2008
    “…We implement a scheduler model and incorporate it into the IP layer output queues using OPNET 10.5 simulation tool. We measure the performance of the algorithms in terms of delay time, size of packet and overflow from different traffic flows during various time periods. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Flood Routing in River Reaches Using a Three-Parameter Muskingum Model Coupled with an Improved Bat Algorithm by Farzin, Saeed, Singh, Vijay, Karami, Hojat, Farahani, Nazanin, Ehteram, Mohammad, Kisi, Ozgur, Allawi, Mohammed Falah, Mohd, Nuruol Syuhadaa, El-Shafie, Ahmed

    Published 2018
    “…The present study attempted to develop a three-parameter Muskingum model considering lateral flow for flood routing, coupling with a new optimization algorithm namely, Improved Bat Algorithm (IBA). …”
    Get full text
    Get full text
    Article
  19. 19

    Transfer learning in near infrared spectroscopy for stingless bee honey quality prediction across different months by Suarin, Nur Aisyah Syafinaz, Chia, Kim Seng, Mohamad Fuzi, Siti Fatimah Zaharah

    Published 2024
    “…Since it is unrealistic to have a NIRS dataset that can represent unforeseen future changes, an algorithm that can adapt existing data for new samples is worth to be investigated. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A discrete event framework for OFDMA relay-based cellular networks by Masoumiyan, Farzaneh, Ahmad Zukarnain, Zuriati, Subramaniam, Shamala, Mohd Hanapi, Zurina

    Published 2014
    “…There are different simulator tools to address these needs such as NS2, OPNet, OMNet++, etc. …”
    Get full text
    Get full text
    Get full text
    Article