Search Results - (( based evaluation based algorithm ) OR ( data communications system algorithm ))

Refine Results
  1. 1

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…The performance metrics which are communication cost and data availability of the protocol are evaluated and compared with two latest quorum-based protocols which are Dynamic Hybrid (DH) and Duplication on Grid (DDG) protocol. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm by Al-Mayouf, Y.R.B., Abdullah, N.F., Ismail, M., Al-Qaraawi, S.M., Mahdi, O.A., Khan, S.

    Published 2016
    “…To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. …”
    Get full text
    Get full text
    Article
  4. 4

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…Our algorithms prolong the battery life by adjusting the base station using initial and final states. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Comparison analysis of stream cipher algorithms for digital communication by Mat Sidek, Abd. Rahim, Sha'ameri, Ahmad Zuri

    Published 2007
    “…The stream cipher algorithms evaluated are based on the linear feedback shift register (LFSR) with nonlinear combining function. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems by Mwinyi, Amir Kombo

    Published 2017
    “…Therefore, the aim of this study is to minimize the computation time during RFS by improving the standard rsync algorithm. Previously, several algorithms and techniques have been proposed for partial file synchronization but many of them were based on controlling the block size, checksums, and delta compression of the matched blocks, to solve the searching problem of the rsync algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Dengue classification system using clonal selection algorithm / Karimah Mohd by Mohd, Karimah

    Published 2012
    “…Dengue classification and detectionsystem will classify if a person have dengue or not based on symptoms. This project focused on three main objectives: to investigate dengue data and Clonal Selection Algorithm for classification of Dengue, to design and develops Clonal Selection Classification System (CSCS) and to evaluate Clonal Selection Classification System symptoms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Secure radio telemetry and data acquisition using wireless data communication system with portable UHF transceivers / Mohd Dani Baba and Deepak Kumar Ghodgaonkar by Baba, Mohd Dani, Ghodgaonkar, Deepak Kumar

    Published 2003
    “…The system comprises of two main subsystems; they are remote telemetry station (RTS) as a data collection center and base telemetry station (BTS) as a data evaluation center. …”
    Get full text
    Get full text
    Research Reports
  9. 9
  10. 10

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…In this research, Cuckoo Search Spring Algorithm (CSSA) is proposed to enhance the robustness of algorithm by constructing the optimal network reconfiguration consist of reducing power losses and improve voltage profile with the various loadability factor as the constraint according to load profile, based on single and multiobjective model. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Mobile data gathering algorithms for wireless sensor networks by Ghaleb, Mukhtar Mahmoud Yahya

    Published 2014
    “…In this research, a Mobile Data Gathering based Network Layout (MDG-NL) algorithm is proposed. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Pairwise Test Suite Generation Using Adaptive Teaching Learning-Based Optimization Algorithm with Remedial Operator by Fakhrud, Din, Kamal Z., Zamli

    Published 2019
    “…Being a NP-complete problem, pairwise test suite generation problem has been addressed using several meta-heuristic algorithms including the Fuzzy Adaptive Teaching Learning-based Optimization (ATLBO) algorithm in the literature. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    TOPSIS-based Regression Algorithms Evaluation by Abu-Shareha, Ahmad Adel

    Published 2022
    “…The results showed that different preferences led to varying algorithm rankings, but top-ranked algorithms were distinguished using a specific dataset. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    TDMA scheduling analysis of energy consumption for iot wireless sensor network by Islam, Md Ashikul

    Published 2019
    “…The base-work paper of the research presents an improvement of DRAND algorithm based on energy consumption in IoT WSN to enhance the node energy consumption and iv increase the network lifetime. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
    Get full text
    Get full text
    Get full text
    Article