Search Results - (( new evaluation tool algorithm ) OR ( time simulation based algorithm ))
Search alternatives:
- simulation based »
- evaluation tool »
- time simulation »
- new evaluation »
- tool algorithm »
-
1
A fault syndromes simulator for random access memories
Published 2008“…Due to this, a systematic approach for developing and evaluating memory test algorithm is required. This work is focused on incorporating the March based test algorithm using a software simulator tool for implementing a fast and systematic memory testing algorithm. …”
Get full text
Get full text
Article -
2
An efficient fault syndromes simulator for SRAM memories
Published 2009“…Due to this, a systematic approach for developing and evaluating memory test algorithm is required. This work is focused on incorporating the March based test algorithm using a software simulator tool for implementing a fast and systematic memory testing algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Parameter characterization of PEM fuel cell mathematical models using an orthogonal learning-based GOOSE algorithm
Published 2025“…This approach demonstrates the ability of the GOOSE algorithm to simulate complex systems and enhances the robustness and adaptability of the simulation tool by integrating essential behaviours into the computational framework. …”
Article -
4
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…Many new algorithms are implemented to reduce nodes energy consumption including Time division Multiplexing algorithm (TDMA) for scheduling to allocate neighbor and reduce signal interference, Distributed Randomize (DRAND) Time Division Multiplexing to do nodes random distribution and allocation. …”
Get full text
Get full text
Thesis -
5
Simulation model to improve QoS performance over fixed WiMAX using OPNET
Published 2013“…The design has been evaluated using the simulation tool OPNET modeler 16.0. …”
Get full text
Get full text
Article -
6
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
Get full text
Get full text
Get full text
Technical Report -
7
Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal
Published 2020“…The proposed EC-TMAC protocol was evaluated through simulation and validated using a statistical analysis tool. …”
Get full text
Get full text
Get full text
Thesis -
8
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…This study extensively analyses articles based on objectives, scheduling techniques, simulation tools, and computing environments. …”
Get full text
Get full text
Get full text
Article -
9
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…For these reasons, to improve the time and accuracy of the coverage in population-based meta-heuristics and their utilization in HPAs, this thesis presents a novel optimization algorithm called the Raccoon Optimization Algorithm (ROA). …”
Get full text
Get full text
Thesis -
10
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
Get full text
Get full text
Get full text
Thesis -
11
A comparative study for parameter selection in online auctions
Published 2009“…The bidding strategies applying self-adaptation model are expected to perform better than the deterministic dynamic adaptation because of the nature of the algorithm itself. The evaluations are conducted in a simulated online auction framework with multiple auctions running concurrently. …”
Get full text
Get full text
Get full text
Thesis -
12
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…Hence, fuzzy clustering analysis such as the Gustafson-Kessel (GK) algorithm is seen to be a very important tool in the field of credit scoring. …”
Get full text
Get full text
Get full text
Thesis -
13
A PI based coordinated maximum power point tracking controller for grid connected photovoltaic system / Md Haidar Islam
Published 2021“…The differences between conventional and other modified MPPT algorithms are explained in this research work. A new coordinated PI-MPPT algorithm is then proposed based on the deficiencies of the other algorithms. …”
Get full text
Get full text
Get full text
Thesis -
14
New optimization feature for the developed open cnc controller based on ISO 6983 and ISO 14649
Published 2021“…However, this system has some limitations, such as tool path optimization. This research aims to minimize tool path airtime during machining of input ISO codes via an ant colony optimization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
Published 2023“…Machine Learning (ML) has been shown to be an effective tool for trust evaluation in WSNs, offering several benefits over existing schemes such as greater adaptability, scalability, and accuracy since ML algorithms can analyze and learn from the data collected in real-time from multiple sources (sensor readings, network traffic, and user behavior) enabling them to dynamically adjust their decision-making criteria based on the current network conditions. …”
Get full text
Get full text
Article -
17
Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data
Published 2008“…In developing the visualization tool, visualization algorithm was used by employing the morphing technique which uses parametric equation. …”
Get full text
Get full text
Thesis -
18
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
19
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
Published 2011“…The ACF-non-cryptographic countermeasure proposes a lightweight security model without involving cryptographic algorithms. The ACF-cryptographic countermeasure proposes four distinct models; two models are based on SHA1 and SHA2, and another two models are based on modified SHA1 and SHA2. …”
Get full text
Get full text
Thesis -
20
Power prediction using the wind turbine power curve and data-driven approaches / Ehsan Taslimi Renani
Published 2018“…The formula comprises of unknown vector parameters of MHTan which can be determined based on MLE. Then, the performance of the MHTan is evaluated using actual data collected as well as three simulated data representing three different typical shapes of the power curve. …”
Get full text
Get full text
Get full text
Thesis
