Search Results - (( user evaluation ((a algorithm) OR (_ algorithm)) ) OR ( change simulation based algorithm ))

Refine Results
  1. 1

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…The proposed algorithm with its variable length solution encoding enables moving the cloudlets among pre-defined locations, adding or removing them in order to increase the quality of service according to the change in the user density caused by user mobility. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…The proposed algorithm is evaluated via computer simulation and modeling where its performance is verified against the few selected algorithms of the same nature. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…The adaptive repository mechanism is a general scheme and can be embedded with high flexibility into any population-based evolutionary algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Developing A Prediction Tool To Improve The Shading Efficiency Of The Pedestrian Zones by Khudhayer, Wael A.

    Published 2020
    “…The development of the prediction tool was conducted base on integrating three sequenced algorithms, which are sun position algorithm, shadow length and position algorithm, and expansion limit algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Adaptive linux-based TCP congestion control algorithm for high-speed networks by Alrshah, Mohamed A.

    Published 2017
    “…The main contributions of this model are: First, to validate the simulation results of AF-based CCA by comparing them to the numerical results of this model and to the results of NewReno as a benchmark. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach by Khan, T., Singh, K., Shariq, M., Ahmad, K., Savita, K.S., Ahmadian, A., Salahshour, S., Conti, M.

    Published 2023
    “…Machine Learning (ML) has been shown to be an effective tool for trust evaluation in WSNs, offering several benefits over existing schemes such as greater adaptability, scalability, and accuracy since ML algorithms can analyze and learn from the data collected in real-time from multiple sources (sensor readings, network traffic, and user behavior) enabling them to dynamically adjust their decision-making criteria based on the current network conditions. …”
    Get full text
    Get full text
    Article
  9. 9

    TDMA scheduling analysis of energy consumption for iot wireless sensor network by Islam, Md Ashikul

    Published 2019
    “…The base-work paper of the research presents an improvement of DRAND algorithm based on energy consumption in IoT WSN to enhance the node energy consumption and iv increase the network lifetime. …”
    Get full text
    Get full text
    Thesis
  10. 10

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…In addition, a prototype was developed to evaluate the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…Finally, a comparison of the newly proposed algorithm and previous algorithms will be evaluated in a table.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor by Mat Ishor, Nur Ayuni Izlin

    Published 2019
    “…Evaluation for this study is to evaluate the of reliability result of recommendation engine by using the approach algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…Another prominent approach is the Dominant Pruning (DP) which is a distributed dominating set algorithm developed to alleviate the impact of flooding in mobile ad-hoc networks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…Likewise, it would be valuable if the proposed scheduling algorithms are evaluated on anticipated networks covering a large number of users in further research.…”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A new dynamic code assignment algorithm for joint CDMA and SDMA system by Odeh, Nidhal A. S., Khatun, Sabira, Ismail, Alyani, Mohd Ali, Borhanuddin

    Published 2008
    “…The probability of blocking is calculated to evaluate the system performance for different number of users and available codes. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20

    The Evaluation of Cyclostationarity-Based Spectrum Sensing in Multipath Fading Channel by Jeoti , Varun

    Published 2010
    “…The results show a superior performance of the proposed algorithms in multipath fading channel.…”
    Get full text
    Get full text
    Conference or Workshop Item