Search Results - (( model evaluation proposed algorithm ) OR ( opnet simulation based algorithm ))*
Search alternatives:
- evaluation proposed »
- proposed algorithm »
- model evaluation »
- opnet simulation »
- simulation based »
-
1
Simulation model to improve QoS performance over fixed WiMAX using OPNET
Published 2013“…The design has been evaluated using the simulation tool OPNET modeler 16.0. …”
Get full text
Get full text
Article -
2
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. …”
Get full text
Get full text
Thesis -
3
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Quality of service performances of three mobile ad hoc network protocols
Published 2009“…The protocols included the Dynamic Source Routing (DSR), Ad Hoc On-demand Distance Vector (AODV) and Temporally Ordered Routing Algorithm (TORA) protocol. The analysis had been done theoretically and through simulation using an Optimized Network Engineering Tools (OPNET) Modeler. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
New synchronization protocol for distributed system with TCP extension
Published 2013“…These results show that the proposed algorithm, on average, has 7.97% higher fault-tolerance. …”
Get full text
Get full text
Thesis -
6
An event-driven simulation for highest urgency first (HUF) : a latency and modulation aware bandwidth allocation algorithm for WiMAX base stations.
Published 2013“…This research has focused at developing a discrete-event simulator to implement bandwidth allocation algorithms for a WiMAX base station.The highest urgency first algorithm has been utilized as a benchmark deployment algorithm in order to provide: dynamic downlink/uplink adjustment and latency guarantee for real-time applications. …”
Get full text
Get full text
Article -
7
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
8
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
9
Performance analysis of packets scheduling with preemptive / Norjanah Kastaman
Published 2008“…We implement a scheduler model and incorporate it into the IP layer output queues using OPNET 10.5 simulation tool. We measure the performance of the algorithms in terms of delay time, size of packet and overflow from different traffic flows during various time periods. …”
Get full text
Get full text
Thesis -
10
A discrete event framework for OFDMA relay-based cellular networks
Published 2014“…There are different simulator tools to address these needs such as NS2, OPNet, OMNet++, etc. …”
Get full text
Get full text
Get full text
Article -
11
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…Validation of the algorithm via the “OPNET” modeler suite software simulation results analysis is also to be carried out to define the best gateway for mapping process. …”
Get full text
Get full text
Final Year Project -
12
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…Validation of the algorithm via the “OPNET” modeler suite software simulation results analysis is also to be carried out to define the best gateway for mapping process. …”
Get full text
Get full text
Final Year Project -
13
Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH
Published 2018“…The study of the multistep ahead forecast is significant for practical application purposes using the proposed statistical model. This study is proposing a new algorithm of Box-Jenkins and GARCH (or BJ-G) in evaluating the multistep forecasting performance of the BJ-G model for highly volatile time series data. …”
Get full text
Get full text
Conference or Workshop Item -
14
Ringed seal search for global optimization via a sensitive search model / Younes Saadi
Published 2018“…The proposed algorithm is characterized by a search model namely the sensitive search model, where the exploitation-exploration is adaptively balanced. …”
Get full text
Get full text
Get full text
Thesis -
15
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…In this study an inverse procedure algorithm is proposed in the time domain to evaluate lightning return stroke current based on measured electromagnetic fields at an observation point. …”
Get full text
Get full text
Article -
16
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
17
-
18
Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition
Published 2010“…The model is evaluated against two previously proposed models and the results confirm the potentiality of dynamic Bayesian networks for dialogue act recognition. …”
Get full text
Get full text
Article -
19
Evaluating the effectiveness of integrated benders decomposition algorithm and epsilon constraint method for multi-objective facility location problem under demand uncertainty
Published 2017“…In order to evaluate the proposed algorithm, some performance metrics including the number of Pareto points, mean ideal points, and maximum spread are used, then the t-test analysis is done which points out that there is a significant difference between aforementioned algorithms.…”
Get full text
Get full text
Get full text
Article -
20
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The reliability of the proposed algorithms have been tested over simulated and real data. …”
Get full text
Get full text
Thesis
