Search Results - (( new evaluation ((case algorithm) OR (tree algorithm)) ) OR ( rate simulation based algorithm ))

Refine Results
  1. 1

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…This new approach called Case Slicing Technique (CST). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…The proposed algorithm is simulated for simultaneous OPF-based conflicting objectives, respectively. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems by Abdulhussein, Mohanad Mohammed

    Published 2021
    “…In the second part, two user clustering algorithms are proposed. These algorithms are alternatives to the PF-SUS-SIR and can achieve better throughput-fairness trade-off in case of perfect CSIT and limited feedback. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An efficient backoff algorithm for IEEE 802.15.4 wireless sensor networks by Dahham, Zahraa, Sali, Aduwati, Mohd Ali, Borhanuddin

    Published 2014
    “…EBA-15.4MAC is designed based on two new techniques; firstly, it updates the contention window size based on the probability of collision parameter. …”
    Get full text
    Get full text
    Article
  5. 5

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission by Ahmad Suki, Che Mohamed Arif

    Published 2011
    “…It is designed based on the Shaped VBR (SVBR) algorithm and was implemented in the Network Simulator 2 (ns-2). …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Evaluating A New Adaptive Group Lasso Imputation Technique For Handling Missing Values In Compositional Data by Tian, Ying

    Published 2024
    “…Considering the impact of outliers on the accuracy of estimation, both simulation and case analysis are conducted to compare the proposed algorithm against four existing methods. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal by Abubakar Bello , Tambawal

    Published 2020
    “…A dynamic time slot allocation strategy using a binary tree algorithm has been proposed to prevent vehicles from the adjacent clusters to reserve the same time slot. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM) by Shamim, Akhtar

    Published 2024
    “…Therefore, in this study a new optimized variant of machine learning algorithms is presented. …”
    Get full text
    Get full text
    Thesis
  10. 10

    On a new transmuted three-parameter lindley distribution and its applications by Xi, Yuhang, Lu, Hezhi, Liang, Fei

    Published 2024
    “…Moreover, the maximum likelihood estimators (MLEs) of the TTHPLD are obtained via differential evolution algorithms, and a simulation study is conducted to evaluate the consistency of the MLEs. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Adaptive linux-based TCP congestion control algorithm for high-speed networks by Alrshah, Mohamed A.

    Published 2017
    “…Thereafter, extensive simulation experiments are carried out to evaluate the performance of the proposed AF-based CCA compared to C-TCP and Cubic-TCP, which are the default CCAs of the most commonly used operating systems. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine by Raad Ali, Rabei

    Published 2019
    “…It is applied to three datasets namely DFRWS (2006 and 2007) forensic challenges datasets and a new dataset to test and evaluate the AJC tool. These datasets have complex challenges that simulate particular fragmentation cases addressed in this research. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Modelling of intelligent intrusion detection system: making a case for snort by Olanrewaju, Rashidah Funke, Ku zahir, Ku Nor Afiza, Asnawi, Ani Liza, Sanni, Mistura Laide, Ahmed, Abdulkadir Adekunle

    Published 2018
    “…The data collected was used to train the Multilayer Feedforward Neural Network (MLFNN) with Back-propagation (BP) algorithm. This MLFNN with BP algorithm was simulated using MATLAB software. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Network bandwidth utilization based on collaborative web caching using machine learning algorithms in peer-to-peer systems for media web objects by Mohammed, Waheed Yasin

    Published 2018
    “…In this work, intelligent collaborative web caching approaches based on C4.5 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks by Qadawi, Zahraa D.A.

    Published 2013
    “…EBA-15.4MAC is based on two new important techniques; firstly, it updates he contention window size based on the probability of collision parameter. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Performance Evaluation Of Combined Code-Space Division Multiple Access With Enhanced Parallel Interference Cancellation by Odeh, Nidhal A.S.

    Published 2007
    “…The performance of the C-SDMA systems was evaluated in terms of bit error rate (BER) and user capacity, considering all the transmitted bits from other interferer users. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Ant-based vehicle congestion avoidance framework using vehicular networks / Mohammad Reza Jabbarpour Sattari by Sattari, Mohammad Reza Jabbarpour

    Published 2015
    “…AVCAF collects real-time traffic data through vehicular networks to consider non-recurring congestion conditions in its routing mechanism via ant-based algorithm. The proposed framework is evaluated and validated through simulation environment. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Channel Modelling and Estimation in Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing Wireless Communication Systems by Hezam, Mohammed Abdo Saeed

    Published 2008
    “…The second issue addressed in this thesis is the channel estimation in MIMO OFDM systems. New time-domain (TD) adaptive estimation methods based on recursive least squares (RLS) and normalized least-mean squares (NLMS) algorithms are proposed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Advanced data mining techniques for landslide susceptibility mapping by Ibrahim, M.B., Mustaffa, Z., Balogun, A.-L., Hamonangan Harahap, I.S., Ali Khan, M.

    Published 2021
    “…Simultaneously, the traditional algorithm is also useful and remains relevant, especially with similar site conditions. …”
    Get full text
    Get full text
    Article