Search Results - (( model evaluation methods algorithm ) OR ( mobile communication based algorithm ))

Refine Results
  1. 1

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…The proposed algorithms are evaluated by considering different metrics, computation modellings, and measurements on the simulation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian by Ali, Azuwa, Salian, Saiful Fadzli

    Published 2009
    “…Handoff performance is analyze based on the number of handoff occurred with respect to user mobility, fading and propagation effect. …”
    Get full text
    Get full text
    Research Reports
  4. 4

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Artificial Bee Colony for Minimizing the Energy Consumption in Mobile Ad Hoc Network by Tareq, M., Abed, S.A., Sundararajan, E.A.

    Published 2019
    “…The aim of this paper is to find the best possible route from the source to the destination based on a method inspired by the searching behaviour of bee colonies, i.e. artificial bee colony (ABC) algorithm. …”
    Get full text
    Get full text
    Article
  6. 6

    GSM-WCDMA hybrid localization techniques in multilayer heterogeneous network / Muhammad Naqiuddin Hassan by Hassan, Muhammad Naqiuddin

    Published 2013
    “…The proposed method has been implemented and evaluated using simulation on MATLAB software under various mobility models. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…Considering the complexity factors, existing literature proposes static execution models for MDSM applications. The execution models are based on either standalone mobile devices, mobile-to-mobile, mobile-to-edge, or mobile-to-cloud communication models. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Channel Modelling and Estimation in Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing Wireless Communication Systems by Hezam, Mohammed Abdo Saeed

    Published 2008
    “…New time-domain (TD) adaptive estimation methods based on recursive least squares (RLS) and normalized least-mean squares (NLMS) algorithms are proposed. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A New Technique To Design Coating Structure For Energy Saving Glass Using The Genetic Algorithm by Azmin, Farah Ayuni

    Published 2017
    “…Genetic algorithm is a method which is easily transferred to the existing simulations and models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    MM-PNEMO: a mathematical model to assess handoff delay and packet loss by Islam, Shayla, Hassan Abdalla Hashim, Aisha, Hasan, Mohammad Kamrul, abdur razzaque, Md.

    Published 2019
    “…This paper analyzes handoff performance by using a mathematical model of Multihoming-based scheme to support Mobility management in Proxy NEMO (MM-PNEMO) environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    The investigation of frame disturbance (fd) in perceptual evaluation speech quality (PESQ) as a perceptual metric by Jusoh, Ahmad Zamani, Togneri, Roberto, Nordholm, Sven, Sulaiman, Nadzril, Khairolanuar, Muhamad Haziq

    Published 2015
    “…P.862 Perceptual Evaluation of Speech Quality (PESQ) model is the state of art on the referenced objective measurement method in the International Telecommunication Union’s Telecommunication Standardization Sector (ITU-T). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications by IZZAH NILAMSYUKRIYAH, BUANG, Kartinah, Zen, Syahrul Nizam, Junaini

    Published 2025
    “…Key topics examined include AI-enhanced adaptive data rate (ADR) methods, coding schemes based on the Chinese Remainder Theorem (CRT), and processes utilizing Variable Order Hidden Markov Models (VHMM). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah by Adewole Kayode, Sakariyah

    Published 2018
    “…The performance of ten (10) machine learning algorithms were evaluated to select the best classifier for both SADM and SMDM. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    An efficient up-link load reduction model based on clustering in vanets by Abbas Al-Sallami, Ali Hashim

    Published 2019
    “…Performance of the EULR model is evaluated through simulation with real-time datasets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC by ABDELRAHMAN ELAMIN, ABDELRAHMAN ELAMIN

    Published 2011
    “…The resulting regions map is compressed by employing quadtree algorithm and communicated to the encoder via the feedback channel. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Adaptive fault tolerant checkpointing algorithm for cluster based mobile Ad Hoc networks by Mansour, Houssem, Badache, Nadjib, Aliouat, Makhlouf, Pathan, Al-Sakib Khan

    Published 2015
    “…In this paper, we propose an adaptive, coordinated and non-blocking checkpointing algorithm to provide fault tolerance in cluster based MANET, where only minimum number of mobile hosts in the cluster should take checkpoints. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network by Adnan, Shahid Khan

    Published 2014
    “…In mobile multihop relay (MMR) networks, Relay multicast rekeying algorithm (RMRA) is meant to ensure secure multicast communication and selective updating of keys in MMR networks. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management by Vivaldi, Indra, Habaebi, Mohamed Hadi, Mohd Ali, Borhanuddin, V., Prakash

    Published 2003
    “…However HhfIPv6 only improves micro mobility problem where the signifcant delay still occurs in the macro mobility management because the handover algorithm is similar with the MIPv6 environment, This paper proposes a new fast handover algorithm that overcomes the limitations in Mobile MIPv6 and its extension HMIPv6. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19
  20. 20