Search Results - (( based evaluation based algorithm ) OR ( _ communication ((cell algorithm) OR (new algorithm)) ))

Refine Results
  1. 1
  2. 2

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…In terms of number of users in the cell, the algorithm could achieve up to 240% of maximum throughput, 61% reduction in ECR and 150% improvement in EE. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An integrated priority-based cell attenuation model for dynamic cell sizing by Amphawan, Angela, Omar, Mohd Nizam, Din, Roshidi

    Published 2012
    “…A new, robust integrated priority-based cell attenuation model for dynamic cell sizing is proposed and simulated using real mobile traffic data.The proposed model is an integration of two main components; the modified virtual community – parallel genetic algorithm (VC-PGA) cell priority selection module and the evolving fuzzy neural network (EFuNN) mobile traffic prediction module.The VC-PGA module controls the number of cell attenuations by ordering the priority for the attenuation of all cells based on the level of mobile level of mobile traffic within each cell.The EFuNN module predicts the traffic volume of a particular cell by extracting and inserting meaningful rules through incremental, supervised real-time learning.The EFuNN module is placed in each cell and the output, the predicted mobile traffic volume of the particular cell, is sent to local and virtual community servers in the VC-PGA module.The VC-PGA module then assigns priorities for the size attenuation of all cells within the network, based on the predicted mobile traffic levels from the EFuNN module at each cell.The performance of the proposed module was evaluated on five adjacent cells in Selangor, Malaysia. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…This is then followed by a discussion on the newly proposed algorithm that is based on a multi size grid and its evaluation by an attacker team. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Self-organizing network technique for resource allocation and mobility management in LTE femtocell network / Labeeb Mohsin Abdullah by Abdullah, Labeeb Mohsin

    Published 2015
    “…MATLAB and Vienna LTE simulators were used to conduct the experiments for the proposed algorithms, approaches and schemes and also used to verify the results. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  7. 7

    Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm by Al-Mayouf, Y.R.B., Abdullah, N.F., Ismail, M., Al-Qaraawi, S.M., Mahdi, O.A., Khan, S.

    Published 2016
    “…To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network by Rashad Mahmood, Saqib, Adnan Shahid, Khan

    Published 2022
    “…The results show that LEMAP is 6%-28% percent stronger than the selected benchmark algorithms such as 2PAKEP, Chaotic based authentication and TwoFactor authentication protocol. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Perceptual speech enhancement exploiting temporal masking properties of human auditory system by Gunawan, Teddy Surya, Ambikairajah, Eliathamby, Epps, Julien

    Published 2010
    “…Objective evaluation using PESQ revealed that using the proposed forward masking model, the speech enhancement algorithm outperforms the other algorithms by 6–20% depending on the SNR. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems by Mwinyi, Amir Kombo

    Published 2017
    “…Therefore, the aim of this study is to minimize the computation time during RFS by improving the standard rsync algorithm. Previously, several algorithms and techniques have been proposed for partial file synchronization but many of them were based on controlling the block size, checksums, and delta compression of the matched blocks, to solve the searching problem of the rsync algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Modified Opposition Based Learning to Improve Harmony Search Variants Exploration by Al-Omoush, Alaa A., Alsewari, Abdulrahman A., Alamri, Hammoudeh S., Kamal Z., Zamli

    Published 2020
    “…Opposition-based learning variants enhanced the explorations and help optimization algorithms to avoid local optima falling. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16

    Dynamic Probability Selection for Flower Pollination Algorithm based on Metropolis-hastings Criteria by Zamli, Kamal Zuhairi, Din, Fakhrud, Nasser, Abdullah, Ramli, Nazirah, Mohamed, Noraini

    Published 2021
    “…This paper proposed flower pollination algorithm metropolis-hastings (FPA-MH) based on the adoption of Metropolis-Hastings criteria adopted from the Simulated Annealing (SA) algorithm to enable dynamic selection of the pa probability. …”
    Get full text
    Get full text
    Article
  17. 17

    Performance Evaluation Of Combined Code-Space Division Multiple Access With Enhanced Parallel Interference Cancellation by Odeh, Nidhal A.S.

    Published 2007
    “…A single cell composed with one base station (BS) and N classes of users is considered. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification by Fajila, Fathima, Yusof, Yuhanis

    Published 2024
    “…Thus, a swarm-based hybrid approach is proposed for cancer classification with a new variant of the Firefly Algorithm (FA) and Correlation-based Feature Selection (CFS) filter. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Dynamic probability selection for flower pollination algorithm based on metropolis-hastings criteria by Zamli, Kamal Zuhairi, Din, Fakhrud, Nasser, Abdullah, Ramli, Nazirah, Mohamed, Noraini

    Published 2021
    “…This paper proposed flower pollination algorithm metropolis-hastings (FPA-MH) based on the adoption of Metropolis-Hastings criteria adopted from the Simulated Annealing (SA) algorithm to enable dynamic selection of the pa probability. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A fast and efficient crosstalk-free algorithm for routing in optical multistage interconnection networks by Raja Mohd Auzar, Tengku Dian Shahida, Othman, Mohamed, Abdullah, Mohamad Khazani

    Published 2008
    “…To evaluate the performance of the new algorithm, a crosstalk-free version of the original ZeroXY algorithm is developed extended from the Improved ZeroXY algorithm, called the Modified ZeroXY algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item