Search Results - (( regional distribution new algorithm ) OR ( user evaluation case algorithm ))

Refine Results
  1. 1

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Another different case of cybersecurity is the Distributed Denial of Services (DDoS) attack. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems by Abdulhussein, Mohanad Mohammed

    Published 2021
    “…In the second part, two user clustering algorithms are proposed. These algorithms are alternatives to the PF-SUS-SIR and can achieve better throughput-fairness trade-off in case of perfect CSIT and limited feedback. …”
    Get full text
    Get full text
    Thesis
  3. 3

    T-way testing : a test case generator based on melody search algorithm by Toh, Shu Yuen

    Published 2015
    “…Next, TTT-MS will be executed through main algorithms to generate Parameters Interaction List, Parameter Values Interaction List, and finally generate final Test Cases based on Melody Search Algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution by Nokhanji, Nooshin

    Published 2014
    “…Therefore, in this study, a new algorithm called Scheduled-Activity Energy Aware Distributed Clustering (SA-EADC) is proposed. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Optimisation of tilt angles for fixed PV Panel via computational algorithm by Tang, Hong Wei

    Published 2022
    “…At the end, it can be concluded that the top priority to obtain the optimum annual energy generation will be Case 1, by following with Case 3 and Case 2.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13

    Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom by Masrom, Suraya

    Published 2015
    “…However, in many cases, implementing the suitable hybrid algorithms for a given optimization problem is a considerably difficult, which in most cases, is time consuming. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An attack proof intelligent digital watermarking based on safe region of fast fourier transform by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Aburas, A. A.

    Published 2010
    “…Keywords: (Artificial Neural Network, Back Propagation algorithm, Fast Fourier Transform, FFT, Image watermarking, Safe Region,) …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Performance Evaluation Of Combined Code-Space Division Multiple Access With Enhanced Parallel Interference Cancellation by Odeh, Nidhal A.S.

    Published 2007
    “…The performance of the C-SDMA systems was evaluated in terms of bit error rate (BER) and user capacity, considering all the transmitted bits from other interferer users. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. The result of the algorithm performance will be appeared in web application system. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  17. 17

    Automated call receiving and forwarding mechanism for supporting integrated disaster management system by Khamis, N.A., Chin Yang, L., Nordin, A.

    Published 2014
    “…The efficiency of the algorithm is evaluated by comparing the response time of the current procedures with the implementation of the algorithm in the proposed prototype. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Comparative analysis of sine cosine and social network search-based algorithm for software test redundancy reduction optimization by Mekeng, Ambros Magnus Rudolf, Kamal Z., Zamli, Muhammad Zarlis, .

    Published 2024
    “…It involves evaluating a software application or system from the user's perspective to validate its operation, usability, and compliance with real-world scenarios. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A PSO inspired asynchronous cooperative distributed hyper-heuristic for course timetabling problems by Joe Henry Obit, Rayner Alfred, Mansour Hassani Abdalla

    Published 2017
    “…From the experimental results, it shows that the proposed Asynchronous Cooperative Distribute Low-level heuristics (ACDLLHs) algorithm is able to find new best solutions for all five medium problem instances and shared optimal solutions for all five small instances. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article