Search Results - (( new evaluation tool algorithm ) OR ( time simulation based algorithm ))

Refine Results
  1. 1

    A fault syndromes simulator for random access memories by Wan Hasan, Wan Zuha, Abdul Halim, Izhal, Mohd Sidek, Roslina, Othman, Masuri

    Published 2008
    “…Due to this, a systematic approach for developing and evaluating memory test algorithm is required. This work is focused on incorporating the March based test algorithm using a software simulator tool for implementing a fast and systematic memory testing algorithm. …”
    Get full text
    Get full text
    Article
  2. 2

    An efficient fault syndromes simulator for SRAM memories by Wan Hasan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Othman, Masuri

    Published 2009
    “…Due to this, a systematic approach for developing and evaluating memory test algorithm is required. This work is focused on incorporating the March based test algorithm using a software simulator tool for implementing a fast and systematic memory testing algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Parameter characterization of PEM fuel cell mathematical models using an orthogonal learning-based GOOSE algorithm by Manoharan P., Ravichandran S., Kavitha S., Tengku Hashim T.J., Alsoud A.R., Sin T.C.

    Published 2025
    “…This approach demonstrates the ability of the GOOSE algorithm to simulate complex systems and enhances the robustness and adaptability of the simulation tool by integrating essential behaviours into the computational framework. …”
    Article
  4. 4

    TDMA scheduling analysis of energy consumption for iot wireless sensor network by Islam, Md Ashikul

    Published 2019
    “…Many new algorithms are implemented to reduce nodes energy consumption including Time division Multiplexing algorithm (TDMA) for scheduling to allocate neighbor and reduce signal interference, Distributed Randomize (DRAND) Time Division Multiplexing to do nodes random distribution and allocation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Simulation model to improve QoS performance over fixed WiMAX using OPNET by Lawal, I.A., Md Said, A., Mu'azu, A.A.

    Published 2013
    “…The design has been evaluated using the simulation tool OPNET modeler 16.0. …”
    Get full text
    Get full text
    Article
  6. 6

    A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers by Alwi @ Suhaimi, Saifulza, Salleh, Mohd Rizal, Jaafar, Hazriq Izzuan, Ab Ghani, Mohd Ruddin, Md Fauadi, Muhammad Hafidz Fazli

    Published 2019
    “…At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  7. 7

    Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal by Abubakar Bello , Tambawal

    Published 2020
    “…The proposed EC-TMAC protocol was evaluated through simulation and validated using a statistical analysis tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review by Al-Qadhi, Abdulrahman K., Latip, Rohaya, Chiong, Raymond, Athauda, Rukshan, Hussin, Masnida

    Published 2025
    “…This study extensively analyses articles based on objectives, scheduling techniques, simulation tools, and computing environments. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures by Koohi, Sina Zangbari

    Published 2020
    “…For these reasons, to improve the time and accuracy of the coverage in population-based meta-heuristics and their utilization in HPAs, this thesis presents a novel optimization algorithm called the Raccoon Optimization Algorithm (ROA). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A comparative study for parameter selection in online auctions by Gan, Kim Soon

    Published 2009
    “…The bidding strategies applying self-adaptation model are expected to perform better than the deterministic dynamic adaptation because of the nature of the algorithm itself. The evaluations are conducted in a simulated online auction framework with multiple auctions running concurrently. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…Hence, fuzzy clustering analysis such as the Gustafson-Kessel (GK) algorithm is seen to be a very important tool in the field of credit scoring. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A PI based coordinated maximum power point tracking controller for grid connected photovoltaic system / Md Haidar Islam by Md Haidar, Islam

    Published 2021
    “…The differences between conventional and other modified MPPT algorithms are explained in this research work. A new coordinated PI-MPPT algorithm is then proposed based on the deficiencies of the other algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    New optimization feature for the developed open cnc controller based on ISO 6983 and ISO 14649 by Obayes, Noor Hatem

    Published 2021
    “…However, this system has some limitations, such as tool path optimization. This research aims to minimize tool path airtime during machining of input ISO codes via an ant colony optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Enhanced dynamic security assessment for power system under normal and fake tripping contingencies. by A. Salih, Qusay

    Published 2019
    “…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach by Khan, T., Singh, K., Shariq, M., Ahmad, K., Savita, K.S., Ahmadian, A., Salahshour, S., Conti, M.

    Published 2023
    “…Machine Learning (ML) has been shown to be an effective tool for trust evaluation in WSNs, offering several benefits over existing schemes such as greater adaptability, scalability, and accuracy since ML algorithms can analyze and learn from the data collected in real-time from multiple sources (sensor readings, network traffic, and user behavior) enabling them to dynamically adjust their decision-making criteria based on the current network conditions. …”
    Get full text
    Get full text
    Article
  17. 17

    Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data by Mohd Rahim, Mohd Shafry

    Published 2008
    “…In developing the visualization tool, visualization algorithm was used by employing the morphing technique which uses parametric equation. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks by Malekzadeh, Mina

    Published 2011
    “…The ACF-non-cryptographic countermeasure proposes a lightweight security model without involving cryptographic algorithms. The ACF-cryptographic countermeasure proposes four distinct models; two models are based on SHA1 and SHA2, and another two models are based on modified SHA1 and SHA2. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Power prediction using the wind turbine power curve and data-driven approaches / Ehsan Taslimi Renani by Ehsan Taslimi , Renani

    Published 2018
    “…The formula comprises of unknown vector parameters of MHTan which can be determined based on MLE. Then, the performance of the MHTan is evaluated using actual data collected as well as three simulated data representing three different typical shapes of the power curve. …”
    Get full text
    Get full text
    Get full text
    Thesis