Search Results - (( data simulation based algorithm ) OR ( its application using algorithm ))
Search alternatives:
- simulation based »
- data simulation »
- its application »
- using algorithm »
-
1
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
text::Thesis -
2
SURE-Autometrics algorithm for model selection in multiple equations
Published 2016“…Its performance is assessed using Monte Carlo simulation experiments based on five specification models, three strengths of correlation disturbances and two sample sizes. …”
Get full text
Get full text
Get full text
Thesis -
3
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…Coordinate Rotation, Digital Computer (CORDIC), known as Volders Algorithm based on its inventor, is an algorithm that is applied to perform trigonometric related computations. …”
Get full text
Get full text
Student Project -
4
Optimisation model for scheduling MapReduce jobs in big data processing / Ibrahim Abaker Targio Hashem
Published 2017“…With the fast development of Internet-based technologies, data generation has increased drastically over the past few years, coined as big data era. …”
Get full text
Get full text
Get full text
Thesis -
5
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…In terms of the applications, The DCFP is more suitable to be used for education applications, while the SNBR is a good algorithm designed to be used for rescue system as data and energy is the main concern. …”
Get full text
Get full text
Get full text
Thesis -
6
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…The findings indicate that the AR Simulation application is a robust tool, with AR’s interactive features effectively rendering data under the defined algorithms. …”
Get full text
Get full text
Get full text
Article -
7
Analysis of multiexponential transient signals using interpolation-based deconvolution and parametric modeling techniques
Published 2003“…The performance of the proposed algorithm in accurately estimating the number of exponential signals and their corresponding exponential consfanis for both simulated and real data is investigated in this paper. …”
Get full text
Get full text
Proceeding Paper -
8
Online Dynamic Replication and Placement Algorithms for Cost Optimization of Online Social Networks in Two-tier Multi-cloud
Published 2024journal::journal article -
9
-
10
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
Get full text
Get full text
Get full text
Article -
11
Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud
Published 2024“…The second algorithm is Dynamic Exponential Time (DET) which determines the data object replication and placement based on exponential time periods. …”
Get full text
Get full text
Get full text
Article -
12
Multiple equations model selection algorithm with iterative estimation method
Published 2016“…This estimation method is equivalent to maximum likelihood estimation at convergence. Therefore, the algorithm is known as SUREIFGLS-Autometrics.Simulation and real data analyses were conducted to assess the performance of the algorithm.The simulation results reveal that the algorithm shows almost similar performances for all conditions involved. …”
Get full text
Get full text
Get full text
Article -
13
Impatient job scheduling under cloud computing
Published 2012“…The proposed system is evaluated via simulation using synthetic data. F rom the results, the proposed algorithm improved the jobs throughput by reducing jobs waiting time by 8 1 .5 % , allowing more jobs to meet their deadlines.…”
Get full text
Get full text
Thesis -
14
A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets
Published 2021“…This condition impeded the entropy-based heuristic of existing ATM algorithm to develop effective decision boundaries due to its biasness towards the dominant class. …”
Get full text
Get full text
Get full text
Article -
15
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…In this research, a Mobile Data Gathering based Network Layout (MDG-NL) algorithm is proposed. …”
Get full text
Get full text
Thesis -
16
Modeling and simulation of the industrial numerical distance relay aimed at knowledge discovery in resident event reporting
Published 2014“…This is justified by the practicality and necessity of divulging the decision algorithm hidden in the recorded relay event report using computational intelligence-based data mining. …”
Get full text
Get full text
Article -
17
The comparison of tardiness in scheduling techniques for task distribution using grid simulation tool
Published 2008“…The goal of this project is to test on tardiness parameter in local search based algorithms. A good scheduling algorithm normally shows lower value of total tardiness and schedule time. …”
Get full text
Get full text
Get full text
Thesis -
18
Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network
Published 2016“…Therefore, this paper proposes a novel routing algorithm called efficient and stable routing algorithm based on user mobility and node density (ESRA-MD). …”
Get full text
Get full text
Article -
19
Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX.
Published 2013“…In this paper, a fuzzy logic based self-adaptive handover (FuzSAHO) algorithm is introduced. …”
Get full text
Get full text
Article -
20
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The said algorithm uses similarity coefficient to classify the real data based on the log-likelihood function and it’s extended to detect incoming fraud calls as suspected by the telecommunication company. …”
Get full text
Get full text
Get full text
Thesis
