Search Results - (( data simulation based algorithm ) OR ( its application using algorithm ))

Refine Results
  1. 1

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
    text::Thesis
  2. 2

    SURE-Autometrics algorithm for model selection in multiple equations by Norhayati, Yusof

    Published 2016
    “…Its performance is assessed using Monte Carlo simulation experiments based on five specification models, three strengths of correlation disturbances and two sample sizes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy by Madzzaini, Nur Sofea Eleena

    Published 2017
    “…Coordinate Rotation, Digital Computer (CORDIC), known as Volders Algorithm based on its inventor, is an algorithm that is applied to perform trigonometric related computations. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Optimisation model for scheduling MapReduce jobs in big data processing / Ibrahim Abaker Targio Hashem by Ibrahim Abaker , Targio Hashem

    Published 2017
    “…With the fast development of Internet-based technologies, data generation has increased drastically over the past few years, coined as big data era. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…In terms of the applications, The DCFP is more suitable to be used for education applications, while the SNBR is a good algorithm designed to be used for rescue system as data and energy is the main concern. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.] by Che Abdullah, Sukarnur, Amari, Mohamad Dzulhelmy, Mat Jusoh, Mohammad Azzeim, Amirudin, Irfan Syahmi Rusyaidi, Zainalabidin, Ashraf

    Published 2025
    “…The findings indicate that the AR Simulation application is a robust tool, with AR’s interactive features effectively rendering data under the defined algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Analysis of multiexponential transient signals using interpolation-based deconvolution and parametric modeling techniques by Salami, Momoh Jimoh Eyiomika, Ismail, Z.

    Published 2003
    “…The performance of the proposed algorithm in accurately estimating the number of exponential signals and their corresponding exponential consfanis for both simulated and real data is investigated in this paper. …”
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9
  10. 10

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud by Aldailamy, Ali Y., Muhammed, Abdullah, Latip, Rohaya, Hamid, Nor Asilah Wati Abdul, Ismail, Waidah

    Published 2024
    “…The second algorithm is Dynamic Exponential Time (DET) which determines the data object replication and placement based on exponential time periods. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…This estimation method is equivalent to maximum likelihood estimation at convergence. Therefore, the algorithm is known as SUREIFGLS-Autometrics.Simulation and real data analyses were conducted to assess the performance of the algorithm.The simulation results reveal that the algorithm shows almost similar performances for all conditions involved. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Impatient job scheduling under cloud computing by Mahdi, Nawfal A.

    Published 2012
    “…The proposed system is evaluated via simulation using synthetic data. F rom the results, the proposed algorithm improved the jobs throughput by reducing jobs waiting time by 8 1 .5 % , allowing more jobs to meet their deadlines.…”
    Get full text
    Get full text
    Thesis
  14. 14

    A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets by Mohd Razali, Muhamad Hasbullah, Saian, Rizauddin, Yap, Bee Wah, Ku-Mahamud, Ku Ruhana

    Published 2021
    “…This condition impeded the entropy-based heuristic of existing ATM algorithm to develop effective decision boundaries due to its biasness towards the dominant class. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Mobile data gathering algorithms for wireless sensor networks by Ghaleb, Mukhtar Mahmoud Yahya

    Published 2014
    “…In this research, a Mobile Data Gathering based Network Layout (MDG-NL) algorithm is proposed. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Modeling and simulation of the industrial numerical distance relay aimed at knowledge discovery in resident event reporting by Othman, Mohammad Lutfi, Aris, Ishak, Abdul Wahab, Noor Izzri

    Published 2014
    “…This is justified by the practicality and necessity of divulging the decision algorithm hidden in the recorded relay event report using computational intelligence-based data mining. …”
    Get full text
    Get full text
    Article
  17. 17

    The comparison of tardiness in scheduling techniques for task distribution using grid simulation tool by Stapa @ Mustapa, Muhamad Azhar

    Published 2008
    “…The goal of this project is to test on tardiness parameter in local search based algorithms. A good scheduling algorithm normally shows lower value of total tardiness and schedule time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network by Al-Mayouf, Y.R.B., Ismail, M., Abdullah, N.F., Wahab, A.W.A., Mahdi, O.A., Khan, S., Choo, R.K.K.

    Published 2016
    “…Therefore, this paper proposes a novel routing algorithm called efficient and stable routing algorithm based on user mobility and node density (ESRA-MD). …”
    Get full text
    Get full text
    Article
  19. 19

    Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX. by Mohd Ali, Borhanuddin, Ismail, Alyani, Noordin, Nor Kamariah, Ben-Mubarak, Mohammed A., Ng , Ben Chee Kyun

    Published 2013
    “…In this paper, a fuzzy logic based self-adaptive handover (FuzSAHO) algorithm is introduced. …”
    Get full text
    Get full text
    Article
  20. 20

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The said algorithm uses similarity coefficient to classify the real data based on the log-likelihood function and it’s extended to detect incoming fraud calls as suspected by the telecommunication company. …”
    Get full text
    Get full text
    Get full text
    Thesis