Search Results - (( rainfall distribution path algorithm ) OR ( user evaluation between algorithm ))

Refine Results
  1. 1

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…This separation contributes in determining the effect of access point on the network performance as well as it allows in evaluating the algorithms that based on the differentiation between the access point and stations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Evaluation of cloud brokering algorithms in cloud based data center by Naha, Ranesh Kumar, Othman, Mohamed, Akhter, Nasrin

    Published 2015
    “…In this paper, two new cloud brokering algorithms, and their initial evaluation, are proposed.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A Rule Extraction Algorithm That Scales Between Fidelity and Comprehensibility by Muthu Anbananthen, Kalaiarasi Sonai, Chan, Fabian Huan Pheng*, Subramaniam, Subhacini, Eimad Eldin, Abdu Ali Abusham

    Published 2012
    “…Since the needs of comprehensibility or fidelity may vary depending on the user or application, this paper presented a significance based rule extraction algorithm that allows a user set parameter to scale between the desired degree of fidelity and comprehensibility of the rules extracted. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Handover procedure between macrocell and femtocell in Long Term Evolution (LTE) network: article / Nurul Afzan Zakaria by Zakaria, Nurul Afzan

    Published 2013
    “…In this project, handover algorithm between macrocell and femtocell has been proposed and developed based on User Equipment (UK) velocity and Receive Signal Strength (RSS). …”
    Get full text
    Get full text
    Article
  7. 7

    Handover procedure between macrocell and femtocell in long term evolution (LTE) network / Nurul Afzan Zakaria by Zakaria, Nurul Afzan

    Published 2013
    “…In this project, handover algorithm between macrocell and femtocell has been proposed and developed based on User Equipment (UE) velocity and Receive Signal Strength (RSS). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Performance evaluation of uncoordinated beamforming over cognitive radio network by Wan Mohd Zuferi , Wan Nadzlia Shazwanie, Ramli, Nordin, Mohamad, Hafizal, Abdullah, Khaizuran

    Published 2012
    “…The interference cancellation is done at the secondary user and no coordination between the primary and secondary users is required as we employed uncoordinated beamforming in the networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    The performance of block codes in digital communication system: article / Nor Afzan Azmi by Azmi, Nor Afzan

    Published 2007
    “…In this project, handover algorithm between macrocell and femtocell has been proposed and developed based on User Equipment (UK) velocity and Receive Signal Strength (RSS). …”
    Get full text
    Get full text
    Article
  10. 10

    Performance analysis of resource allocation downlink for MIMO-OFDMA system using Greedy algorithm. / Azrinawati Samaon by Samaon, Azrinawati

    Published 2014
    “…The proposed algorithm shows comparison between the noise to sub-channel ratio and power allocation in the midst of data sub-channel for 25, 75 and 100 users. …”
    Get full text
    Get full text
    Article
  11. 11

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…Likewise, it would be valuable if the proposed scheduling algorithms are evaluated on anticipated networks covering a large number of users in further research.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Channel selection strategies for co-existence between wimax and wifi by Jong, Siat Ling

    Published 2009
    “…A channel selection algorithm is proposed to improve the secondary user's throughput and avoid interference with primary user. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Travel place recommendation system using K-Nearest Neighbors algorithm / Nur Amirah Shahidan by Shahidan, Nur Amirah

    Published 2021
    “…The Travel Place Recommendation System will calculate the similarity between user’s rating and compare each of the user to recommend several travel places to user. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An adaptive QOS scheduling algorithm in service oriented grid and cloud environment / Ang Tan Fong by Ang, Tan Fong

    Published 2011
    “…AQoSSA is able to maximize reliability and profit while guaranteeing the users’ QoS requirements. An experimental testbed is developed to evaluate the performances of all the proposed algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Anime recommender system using K-nearest neighbor algorithm / Luqmanul Hakim Ahmad by Ahmad, Luqmanul Hakim

    Published 2022
    “…Next, the 10 nearest distances between data and the input will be given to the user. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Adaptive method to improve web recommendation system for anonymous users by Almurtadha, Yahya Mohammed

    Published 2011
    “…This research focuses on improving the prediction of the next visited web pages and introduces them to current anonymous user. An enhanced classification algorithm is used to assign the current anonymous user to the best web navigation profile. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. This is to ensure the data or files being shared between users are secure from and breach. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Performance analysis of resource allocation downlink for MIMO-OFDMA system using greedy algorithm / Azrinawati Samaon by Samaon, Azrinawati

    Published 2016
    “…The proposed algorithm shows comparison between the noise to sub-channel ratio and power allocation among of data sub-channel for 25, 75 and 100 users. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Kuala Terengganu homestay recommender system using Content Based filtering algorithm / Nur Atierah Nor Azman by Nor Azman, Nur Atierah

    Published 2024
    “…It is required to find and compares the similarity between the user’s preferences and the characteristics of the homestay. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Explaining recreationist responsible behaviour : a case of scuba diving / Ong Tah Fat by Ong, Tah Fat

    Published 2012
    “…AQoSSA is able to maximize reliability and profit while guaranteeing the users’ QoS requirements. An experimental testbed is developed to evaluate the performances of all the proposed algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis