Search Results - (( based evaluation from algorithm ) OR ( rate simulation based algorithm ))*

Refine Results
  1. 1

    PMT : opposition based learning technique for enhancing metaheuristic algorithms performance by Hammoudeh, S. Alamri

    Published 2020
    “…To evaluate the PMT’s performance and adaptability, the PMT was applied to four contemporary metaheuristic algorithms, Differential Evolution, Particle Swarm Optimization, Simulated Annealing, and Whale Optimization Algorithm, to solve 15 well-known benchmark functions as well as 2 real world problems based on the welded beam design and pressure vessel design. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…The proposed algorithm is simulated for simultaneous OPF-based conflicting objectives, respectively. …”
    Get full text
    Get full text
    Thesis
  3. 3

    PMT: opposition-based learning technique for enhancing meta-heuristic performance by Alamri, Hammoudeh S., Kamal Z., Zamli

    Published 2019
    “…The experimentally, the PMT shows promising results by accelerating the convergence rate against the original algorithms with the same number of fitness evaluations.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Hybridization of enhanced ant colony system and Tabu search algorithm for packet routing in wireless sensor network by Husna, Jamal Abdul Nasir

    Published 2020
    “…Better performances were also achieved for success rate, throughput, and latency when compared to other hybrid routing algorithms such as Fish Swarm Ant Colony Optimization (FSACO), Cuckoo Search-based Clustering Algorithm (ICSCA), and BeeSensor-C. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
    Get full text
    Get full text
    Thesis
  9. 9

    A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens by Z. L., Chuan, A. A., Jemain, C-Y, Liong, N. A. M., Ghani, L. K., Tan

    Published 2017
    “…A total of 250 simulated noisy images collected from five different pistols of the same make, model and caliber are used to evaluate the robustness of the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Hybrid Cat Swarm Optimization and Simulated Annealing for Dynamic Task Scheduling on Cloud Computing Environment by Gabi, Danlami, Ismail, Abdul Samad, Zainal, Anazida, Zakaria, Zalmiyah, Al-Khasawneh, Ahmad

    Published 2018
    “…In this study, a Cloud Scalable Multi-Objective Cat Swarm Optimization-based Simulated Annealing algorithm is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…The developed scheduling algorithm is accomplished in three methodological stages as follows: first, frequency domain was considered for efficient scheduling at Resource Blocks (RBs) to the users based on best Channel Quality Indicator (CQI) report send from mobile station called as User Equipment (UE) to the base station (eNodeB). …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…The simulation process was conducted using Network Simulator-3 (NS-3) and the performance of these packet scheduling algorithms were evaluated based on the performance metrics of throughput, delay, packet loss ratio (PLR), energy consumption rate (ECR), and EE for the voice over IP (VoIP), video and File Transfer Protocol (FTP) applications. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin by Suhaimi, Hamizan, Suliman, Saiful Izwan, Musirin, Ismail

    Published 2021
    “…Based on the 1999 KDD Cup data set with various disruptions simulated from the military network, this research was conducted based on this standard dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Block based low complexity iterative QR precoder structure for Massive MIMO by Mok, Li Suet

    Published 2021
    “…Meanwhile, we maximize the sum rate and also consider the restrictions on the computational complexity at the base station. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Application of the Whale Optimization Algorithm (WOA) in Reservoir Optimization Operation Under Investigation of Climate Change Impact: A Case Study at Klang Gate Dam, Malaysia by Lai V., Huang Y.F., Koo C.H., Ahmed A.N., El-Shafie A.

    Published 2024
    “…The effectiveness of analyzing large amounts of data that comes with engaging climate change scenarios, for planning advanced reservoir management can be achieved through the use of optimization algorithms. The Whale Optimization Algorithm (WOA) is a swarm intelligence algorithm derived following animal-behaviour-based concepts. …”
    Conference Paper
  16. 16

    A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments by Khaksar, Weria

    Published 2013
    “…The motion planning problem poses the question of how a robot can move from an initial to a final position. Sampling-based motion planning is a class of randomized path planning algorithms with proven completeness. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…Based on algorithm evaluation, it shows that one control method couldn’t fit to all persons as per proven in method selection experiment. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Performance and energy evaluation of dynamic adaptive deterministic routing algorithm for multicore architectures by Asrani, Lit, Maimun, Huja Hussin, Shamsiah, Suhaili

    Published 2024
    “…To substantiate our conclusions, we conducted simulations of the 64-core and 100-core mesh-based NoC and WiNoC architectures under the Video Image Processing System (VIPS) benchmark workload. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Agile-SD: a Linux-based TCP congestion control algorithm for supporting high-speed and short-distance networks by Alrshah, Mohamed A., Othman, Mohamed, Mohd Ali, Borhanuddin, Mohd Hanapi, Zurina

    Published 2015
    “…Indeed, the overall performance of such networks is significantly influenced by the Congestion Control Algorithm (CCA) which suffers from the problem of bandwidth under-utilization, especially if the applied buffer regime is very small. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems by Abdulhussein, Mohanad Mohammed

    Published 2021
    “…The first algorithm is based on integrating the maximum product of effective channel gains and the maximum SIR with the PF principle (PF-MPECG-SIR) to select strong users in the first stage and weak users in the second stage. …”
    Get full text
    Get full text
    Thesis