Search Results - (( mobile evaluation drops algorithm ) OR ( _ identification method algorithm ))
Search alternatives:
- identification method »
- mobile evaluation »
- evaluation drops »
- _ identification »
- method algorithm »
-
1
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
Get full text
Get full text
Get full text
Thesis -
2
Performance evaluation of manet in presence of black hole nodes
Published 2017“…And then we will apply an algorithm that can offer better performance evaluation of the MANET compare to previous work[1]. …”
Get full text
Get full text
Thesis -
3
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…This algorithm is good for MANET as they not have centralized management and autonomous mobile nodes connect with each other through the air. …”
Get full text
Get full text
Thesis -
4
Performance evaluation of enhanced MANETs routing protocols under video traffics, for different mobility and scalability models using OPNET
Published 2017“…Different mobility and scalability scenarios are evaluated after simulation of network with the help of OPNET modeler simulator…”
Get full text
Get full text
Get full text
Article -
5
-
6
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
Get full text
Get full text
Get full text
Article -
7
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
8
Improving Adaptive Quality of Service for Multimedia Wireless Networks Using Hierarchical Networks Approach
Published 2004“…As in wireline networks, the wireless network must able to provide a guaranteed quality of service (QoS) over the lifetime of mobile connections. Some challenging problems such as user mobility, limited frequency spectrum and shortage of bandwidth, influence the QoS provisioning for the users. …”
Get full text
Get full text
Thesis -
9
An integrated priority-based cell attenuation model for dynamic cell sizing
Published 2012“…Real-time predicted mobile traffic from the EFuNN structure was used to control the size of all the cells.Results obtained demonstrate the robustness of the integrated module in recognizing the temporal pattern of the mobile traffic and dynamically controlling the cell size in order to reduce the number of calls dropped.…”
Get full text
Get full text
Get full text
Article -
10
Token based path allocation approach for mobile robots in sorting centre for achieving high throughput
Published 2024“…From here, we will first review and evaluates some of the approaches that have been done by previous studies. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
Get full text
Get full text
Thesis -
12
Quality of service performances of three mobile ad hoc network protocols
Published 2009“…The thesis proposed to evaluate the Quality of Service (QoS) performances of three types MANET protocols. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…This article proposes an identification method of continuous-time fractional-order Hammerstein model using smoothed functional algorithm with a norm-limited update vector (NL-SFA). …”
Get full text
Get full text
Get full text
Article -
14
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…We then develop a new algorithm to address the summarizing strategies identification problem. …”
Get full text
Get full text
Thesis -
15
Hybrid DE and PEM algorithm for identification of small scale Autonomous helicopter model
Published 2012“…The proposed hybrid identification method explored the evolutionary search optimization strength of DE for parameter initialization for PEM identification algorithm…”
Get full text
Get full text
Monograph -
16
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Substantial simulations have been extensively carried out to evaluate the performance of the proposed algorithms compared with the existing RRM algorithms. …”
Get full text
Get full text
Thesis -
17
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Model structure selection is one of the important steps in a system identification process. Evolutionary computation (EC) is known to be an effective search and optimization method and in this paper EC is proposed as a model structure selection algorithm. …”
Get full text
Get full text
Get full text
Article -
18
MULTIVARIABLE CLOSED-LOOP SYSTEM IDENTIFICATION USING ITERATIVE LEAKY LEAST MEAN SQUARES METHOD
Published 2017“…In this thesis. iterative Leaky Least Mean Squares (LLMS) based methods are proposed to address the limitations ofLS method in MultiInput Multi-Output (MIMO) closed-loop system identification. …”
Get full text
Get full text
Thesis -
19
Modified multi-verse optimizer for nonlinear system identification of a double pendulum overhead crane
Published 2021“…In the HMVOSCA algorithm, the new position updating mechanism of the traditional MVO method is modified based on the sine function and cosine function which is taken from the Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015“…The method is based on Graph-Cut algorithm which applied on satellite stereo images. …”
Get full text
Get full text
Conference or Workshop Item
