Search Results - (( mobile evaluation drops algorithm ) OR ( rate optimization based algorithm ))*

Refine Results
  1. 1

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…The algorithm is based on the idea of the optimization problem in which resource allocation problem is formulated as an optimization problem. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Performance evaluation of manet in presence of black hole nodes by Dhahir, Saif Mahmood

    Published 2017
    “…And then we will apply an algorithm that can offer better performance evaluation of the MANET compare to previous work[1]. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…This algorithm is good for MANET as they not have centralized management and autonomous mobile nodes connect with each other through the air. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…A new meta-heuristic optimization technique called the Slime Mould Algorithm (SMA) approach has a high convergence rate or a few iterations and superior optimization indices analyzed against other algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Performance evaluation of enhanced MANETs routing protocols under video traffics, for different mobility and scalability models using OPNET by Ahmed, Diaa Eldein Mustafa, Khalifa, Othman Omran

    Published 2017
    “…Different mobility and scalability scenarios are evaluated after simulation of network with the help of OPNET modeler simulator…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    An enhanced opposition-based firefly algorithm for solving complex optimization problems by Ling, Ai Wong, Hussain Shareef, Azah Mohamed, Ahmad Asrul Ibrahim

    Published 2014
    “…Firefl y algorithm is one of the heuristic optimization algorithms which mainly based on the light intensity and the attractiveness of fi refl y. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Machining optimization using Firefly Algorithm / Farhan Md Jasni by Md Jasni, Farhan

    Published 2020
    “…Based on the previous research on the success of Firefly Algorithm, this approach will be able to optimize the machining parameter of milling operation. …”
    Get full text
    Get full text
    Student Project
  10. 10
  11. 11

    PMT : opposition based learning technique for enhancing metaheuristic algorithms performance by Hammoudeh, S. Alamri

    Published 2020
    “…Experimentally, the PMT shows promising results by accelerating the convergence rate against the original algorithms with the same number of fitness evaluations comparing to the original metaheuristic algorithms in benchmark functions and real-world optimization problems.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimization of milling parameters using ant colony optimization by Mohd Saupi, Mohd Sauki

    Published 2008
    “…The simulation based on ACO algorithm are successful develop and the optimization of parameters values is to maximize the production rate is obtain from the simulation.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin by Hussin, Noor Rasyidah

    Published 2014
    “…Bat algorithm was employed to optimize the training parameters such as learning rate, momentum rate and number of neurons in hidden layers. …”
    Get full text
    Get full text
    Article
  14. 14

    An enhanced metaheuristic approach to solve quadratic assignment problem using hybrid technique by Hameed, Asaad Shakir

    Published 2021
    “…The valuate of performance HDDETS algorithm comparison to existing hybrid-based algorithms, namely: Biogeography-Based Optimization Tabu Search (BBOTS), Whale Algorithm with Tabu Search (WAITS), Hybrid Ant System (HAS), Lexisearch and Genetic Algorithms (LSGA), and Golden Ball Simulated Annealing (GBSA) algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Hybrid bat algorithm hybrid-artificial neural network for modeling operating photovoltaic module temperature / Noor Rasyidah Hussin by Hussin, Noor Rasyidah

    Published 2014
    “…Bat algorithm was employed to optimize the training parameters such as learning rate, momentum rate and number of neurons in hidden layers. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Firefly algorithm-based neural network for GCPV system output prediction: article / Nor Syakila Mohd Zainol Abidin by Mohd Zainol Abidin, Nor Syakila

    Published 2014
    “…FA was used to optimize the number of neurons in the hidden layer, the learning rate and the momentum rate such that the Root Mean Square Error (RMSE) was minimized. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…Using a number of candidate detectors from an improved Apriori Algorithm with Particle Swarm Optimization, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Article