Search Results - (( user evaluation ((a algorithm) OR (_ algorithm)) ) OR ( change simulation model algorithm ))
Search alternatives:
- change simulation »
- user evaluation »
- model algorithm »
- a algorithm »
-
1
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…The proposed algorithm with its variable length solution encoding enables moving the cloudlets among pre-defined locations, adding or removing them in order to increase the quality of service according to the change in the user density caused by user mobility. …”
Get full text
Get full text
Thesis -
3
Channel selection strategies for co-existence between wimax and wifi
Published 2009“…A channel selection algorithm is proposed to improve the secondary user's throughput and avoid interference with primary user. …”
Get full text
Get full text
Thesis -
4
-
5
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…The proposed algorithm is evaluated via computer simulation and modeling where its performance is verified against the few selected algorithms of the same nature. …”
Get full text
Get full text
Get full text
Article -
6
Adaptive linux-based TCP congestion control algorithm for high-speed networks
Published 2017“…The main contributions of this model are: First, to validate the simulation results of AF-based CCA by comparing them to the numerical results of this model and to the results of NewReno as a benchmark. …”
Get full text
Get full text
Thesis -
7
Improving Adaptive Quality of Service for Multimedia Wireless Networks Using Hierarchical Networks Approach
Published 2004“…The key feature of this framework is the integration of the hierarchical network together with the modified Call Admission Control (CAC) algorithm and the bandwidth reallocation scheme. These schemes are developed to control the bandwidth operation of ongoing connections when the system is overloaded depending on the movement speed of a particular user assuming the speed of a mobile user would not be changed throughout the duration of a connection. …”
Get full text
Get full text
Thesis -
8
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
Published 2023“…Simulation experiments exhibit the effectiveness of the proposed trust evaluation method in terms of change in trust values, malicious nodes detection (94), FNR (0.9), F1-Score (0.6), and accuracy (92) in the presence of 50 malicious nodes. …”
Get full text
Get full text
Article -
9
Application of dynamic mesh to model surface evolution under solid particles erosion in positive choke geometries
Published 2026“…The effect of shape change on erosion rate was predicted using CFD modeling. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
Get full text
Get full text
Thesis -
11
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Finally, a comparison of the newly proposed algorithm and previous algorithms will be evaluated in a table.…”
Get full text
Get full text
Get full text
Article -
13
Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor
Published 2019“…Evaluation for this study is to evaluate the of reliability result of recommendation engine by using the approach algorithm. …”
Get full text
Get full text
Thesis -
14
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Likewise, it would be valuable if the proposed scheduling algorithms are evaluated on anticipated networks covering a large number of users in further research.…”
Get full text
Get full text
Thesis -
15
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
16
A new dynamic code assignment algorithm for joint CDMA and SDMA system
Published 2008“…The probability of blocking is calculated to evaluate the system performance for different number of users and available codes. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
18
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006Get full text
Get full text
Get full text
Proceeding Paper -
19
The Evaluation of Cyclostationarity-Based Spectrum Sensing in Multipath Fading Channel
Published 2010“…The results show a superior performance of the proposed algorithms in multipath fading channel.…”
Get full text
Get full text
Conference or Workshop Item -
20
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article
