Search Results - (( new evaluation ((case algorithm) OR (tree algorithm)) ) OR ( rate simulation based algorithm ))
Search alternatives:
- simulation based »
- rate simulation »
- new evaluation »
- case algorithm »
- tree algorithm »
-
1
Case Slicing Technique for Feature Selection
Published 2004“…This new approach called Case Slicing Technique (CST). …”
Get full text
Get full text
Thesis -
2
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…The proposed algorithm is simulated for simultaneous OPF-based conflicting objectives, respectively. …”
Get full text
Get full text
Thesis -
3
Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems
Published 2021“…In the second part, two user clustering algorithms are proposed. These algorithms are alternatives to the PF-SUS-SIR and can achieve better throughput-fairness trade-off in case of perfect CSIT and limited feedback. …”
Get full text
Get full text
Thesis -
4
An efficient backoff algorithm for IEEE 802.15.4 wireless sensor networks
Published 2014“…EBA-15.4MAC is designed based on two new techniques; firstly, it updates the contention window size based on the probability of collision parameter. …”
Get full text
Get full text
Article -
5
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. …”
Get full text
Get full text
Thesis -
6
Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission
Published 2011“…It is designed based on the Shaped VBR (SVBR) algorithm and was implemented in the Network Simulator 2 (ns-2). …”
Get full text
Get full text
Get full text
Thesis -
7
Evaluating A New Adaptive Group Lasso Imputation Technique For Handling Missing Values In Compositional Data
Published 2024“…Considering the impact of outliers on the accuracy of estimation, both simulation and case analysis are conducted to compare the proposed algorithm against four existing methods. …”
Get full text
Get full text
Thesis -
8
Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal
Published 2020“…A dynamic time slot allocation strategy using a binary tree algorithm has been proposed to prevent vehicles from the adjacent clusters to reserve the same time slot. …”
Get full text
Get full text
Get full text
Thesis -
9
An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM)
Published 2024“…Therefore, in this study a new optimized variant of machine learning algorithms is presented. …”
Get full text
Get full text
Thesis -
10
On a new transmuted three-parameter lindley distribution and its applications
Published 2024“…Moreover, the maximum likelihood estimators (MLEs) of the TTHPLD are obtained via differential evolution algorithms, and a simulation study is conducted to evaluate the consistency of the MLEs. …”
Get full text
Get full text
Get full text
Article -
11
Adaptive linux-based TCP congestion control algorithm for high-speed networks
Published 2017“…Thereafter, extensive simulation experiments are carried out to evaluate the performance of the proposed AF-based CCA compared to C-TCP and Cubic-TCP, which are the default CCAs of the most commonly used operating systems. …”
Get full text
Get full text
Thesis -
12
Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine
Published 2019“…It is applied to three datasets namely DFRWS (2006 and 2007) forensic challenges datasets and a new dataset to test and evaluate the AJC tool. These datasets have complex challenges that simulate particular fragmentation cases addressed in this research. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
14
Modelling of intelligent intrusion detection system: making a case for snort
Published 2018“…The data collected was used to train the Multilayer Feedforward Neural Network (MLFNN) with Back-propagation (BP) algorithm. This MLFNN with BP algorithm was simulated using MATLAB software. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Network bandwidth utilization based on collaborative web caching using machine learning algorithms in peer-to-peer systems for media web objects
Published 2018“…In this work, intelligent collaborative web caching approaches based on C4.5 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Thesis -
16
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
Published 2013“…EBA-15.4MAC is based on two new important techniques; firstly, it updates he contention window size based on the probability of collision parameter. …”
Get full text
Get full text
Thesis -
17
Performance Evaluation Of Combined Code-Space Division Multiple Access With Enhanced Parallel Interference Cancellation
Published 2007“…The performance of the C-SDMA systems was evaluated in terms of bit error rate (BER) and user capacity, considering all the transmitted bits from other interferer users. …”
Get full text
Get full text
Thesis -
18
Ant-based vehicle congestion avoidance framework using vehicular networks / Mohammad Reza Jabbarpour Sattari
Published 2015“…AVCAF collects real-time traffic data through vehicular networks to consider non-recurring congestion conditions in its routing mechanism via ant-based algorithm. The proposed framework is evaluated and validated through simulation environment. …”
Get full text
Get full text
Thesis -
19
Channel Modelling and Estimation in Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing Wireless Communication Systems
Published 2008“…The second issue addressed in this thesis is the channel estimation in MIMO OFDM systems. New time-domain (TD) adaptive estimation methods based on recursive least squares (RLS) and normalized least-mean squares (NLMS) algorithms are proposed. …”
Get full text
Get full text
Thesis -
20
Advanced data mining techniques for landslide susceptibility mapping
Published 2021“…Simultaneously, the traditional algorithm is also useful and remains relevant, especially with similar site conditions. …”
Get full text
Get full text
Article
