Search Results - (( new evaluation study algorithm ) OR ( rate simulation based algorithm ))*

Refine Results
  1. 1

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network by Khairi, Kharina

    Published 2003
    “…This algorithm paved the way for the generation of performance parameters through simulation of the new LAN. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Second, propose an Optimized Time Sliding Window based Three Colour Marker. Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A comparative study for parameter selection in online auctions by Gan, Kim Soon

    Published 2009
    “…In this work, three different models of genetic algorithms are considered. In the first model, the crossover and the mutation rate of the genetic algorithms are varied in order to create different combination of crossover and mutation rate. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Evaluating A New Adaptive Group Lasso Imputation Technique For Handling Missing Values In Compositional Data by Tian, Ying

    Published 2024
    “…Considering the impact of outliers on the accuracy of estimation, both simulation and case analysis are conducted to compare the proposed algorithm against four existing methods. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Adaptive linux-based TCP congestion control algorithm for high-speed networks by Alrshah, Mohamed A.

    Published 2017
    “…Thereafter, extensive simulation experiments are carried out to evaluate the performance of the proposed AF-based CCA compared to C-TCP and Cubic-TCP, which are the default CCAs of the most commonly used operating systems. …”
    Get full text
    Get full text
    Thesis
  9. 9

    On a new transmuted three-parameter lindley distribution and its applications by Xi, Yuhang, Lu, Hezhi, Liang, Fei

    Published 2024
    “…Moreover, the maximum likelihood estimators (MLEs) of the TTHPLD are obtained via differential evolution algorithms, and a simulation study is conducted to evaluate the consistency of the MLEs. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Nomadic people optimizer (NPO) for large-scale optimization problems by Mohamd Salih, Sinan Qahtan

    Published 2019
    “…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A new Gompertz-three-parameter-lindley distribution for modeling survival time data by Liang, Fei, Lu, Hezhi, Xi, Yuhang

    Published 2025
    “…Maximum likelihood estimators (MLEs) of unknown parameters are obtained via differential evolution algorithms, and simulation studies are conducted to evaluate the consistency of the MLEs. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Performance evaluation of relay deployment in Long Term Evolution Advanced (LTE-A) network / Aminah Najihah Jaafar by Jaafar, Aminah Najihah

    Published 2016
    “…Algorithms to determine the minimum distance between users and both Base Station (BS) and RN and the signal strength received in the proposed scheme also provided. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network by Al-Kharasani, Nori Mohammed Abdulkarem

    Published 2020
    “…To provide the necessary robustness, a new Cluster-based Adoptive Cooperative Algorithm (CACA) for VANET is introduced to improve the scalability of the network and reduce control overhead. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Modelling of intelligent intrusion detection system: making a case for snort by Olanrewaju, Rashidah Funke, Ku zahir, Ku Nor Afiza, Asnawi, Ani Liza, Sanni, Mistura Laide, Ahmed, Abdulkadir Adekunle

    Published 2018
    “…The performance of this classifier was evaluated based on three parameters: accuracy, sensitivity, and False Positive Rate (FPR). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Channel Modelling and Estimation in Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing Wireless Communication Systems by Hezam, Mohammed Abdo Saeed

    Published 2008
    “…The second issue addressed in this thesis is the channel estimation in MIMO OFDM systems. New time-domain (TD) adaptive estimation methods based on recursive least squares (RLS) and normalized least-mean squares (NLMS) algorithms are proposed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A novel framework for secure cryptocurrency transactions using quantum crypto guard by Jamil Alsayaydeh, Jamil Abedalrahim, Yusof, Mohd Faizal, Yahaya, Nor Adnan, Kovtu, Viacheslav, Herawan, Safarudin Gazali

    Published 2025
    “…The QCG-ST employs lattice-based cryptography to provide robust protection against quantum threats and incorporates a new consensus mechanism to increase the transaction speed and reduce energy consumption. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20