Search Results - (( model evaluation tool algorithm ) OR ( data communications system algorithm ))
Search alternatives:
- communications system »
- data communications »
- model evaluation »
- system algorithm »
- evaluation tool »
- tool algorithm »
-
1
Enhancing quality of service in Multi-Radio Multi-Channel Wireless Mesh Networks
Published 2023“…Through extensive simulations, this research validates the effectiveness of the proposed algorithms compared to existing ones. This research utilizes the OmNET++ 4.6 simulator, an open-source tool in C++, to evaluate proposed algorithms effectively. …”
Get full text
Get full text
Get full text
Thesis -
2
Thermal-Aware NoC for AI Computing: Tools, Algorithms, and Applications
Published 2026“…Unlike general DNN-accelerator surveys, this survey paper focuses on the thermal-NoC interplay under realistic AI workloads and provides an actionable, closed-loop methodology and tooling for scalable, verifiable evaluation. We conclude with open challenges, scalable yet faithful co-simulation, standardized traces/interfaces, packaging-aware models, and uncertainty-aware surrogates, to guide the path toward thermally resilient, high-throughput AI systems.…”
Get full text
Get full text
Get full text
Article -
3
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…KD-3D-CA cryptosystem security was tested using NIST statistical tools, Avalanche test, S-Box Evaluation Tool (SET) test, performance test, and complexity test. …”
Get full text
Get full text
Thesis -
4
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…The findings indicate that the AR Simulation application is a robust tool, with AR’s interactive features effectively rendering data under the defined algorithms. …”
Get full text
Get full text
Get full text
Article -
5
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
7
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…These steps have conducted using the MEMPHA model and ROA algorithm to optimize three metrics: execution time, total communication volume, and imbalance ratio (load balancing). …”
Get full text
Get full text
Thesis -
9
Research on College Students' Classroom Learning Based on Informatization to Promote English Education System in China
Published 2023“…Following the preprocessing of the dataset with the Hidden Markov Model (HMM) Stemming Algorithm and the application of information technology with the Radial Basis Coherent Deep Neural Network (RBCDNN), the dataset is evaluated for statistical significance with the Panel Unit Test and the Housman test. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
Published 2023“…The unmanned aerial vehicles (UAVs) in military and civilian systems access sensitive data via cellular networks and are ubiquitous. …”
Get full text
Get full text
Article -
11
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
12
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The obvious problem in this SM is it uses single communication system as there was no contingency plan in transferring the data when the signal strength was weak or failure during data transfer process. …”
Get full text
Get full text
Thesis -
13
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…Smart grid is an evolution from conventional power grid in which power communication system has migrated from one-way to bi-directional communication network. …”
text::Thesis -
14
Data Analysis and Machine Learning Algorithms Evaluation for Bioliq AI-based Predictive Tool
Published 2019“…This final year project identified relevant parameters through literature research, analysis and expert interview, and evaluated different machine learning algorithms and identified linear regression as the most applicable and efficient with its R-square of 0.8015, qualifying it to be used for the development of a hybrid model for the AI-based tool for predictive process optimization for chemical plants.…”
Get full text
Get full text
Final Year Project -
15
Iterative data detection and channel estimation for single-parity check-product coded MIMO wireless communications system
Published 2005“…In iterative data-detection and channel-estimation algorithms, the channel estimator and the data detector recursively exchange the information order to improve the system performance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A survey of simulators, emulatots and testbeds for Wireless Sensor Network
Published 2010“…Simulators, emulators and testbeds are invaluable tools for performance evaluation of algorithms and protocols in wireless sensor networks (WSNs). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Development of collision avoidance system for multiple autonomous mobile robots
Published 2023Article -
18
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Design and implementation of multimedia digital matrix system
Published 2005“…Besides, the algorithm enables an accurate prediction to the center of data eye with an even number of oversampling clock to data rate ratio. …”
Get full text
Get full text
Conference or Workshop Item -
20
Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti
Published 2024“…This research project focuses on developing a laptop price prediction model using the decision tree algorithm based on laptop specifications. …”
Get full text
Get full text
Thesis
