Search Results - (( user evaluation ((a algorithm) OR (bat algorithm)) ) OR ( a simulation based algorithm ))

Refine Results
  1. 1

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…The simulation process was conducted using Network Simulator-3 (NS-3) and the performance of these packet scheduling algorithms were evaluated based on the performance metrics of throughput, delay, packet loss ratio (PLR), energy consumption rate (ECR), and EE for the voice over IP (VoIP), video and File Transfer Protocol (FTP) applications. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A fault syndromes simulator for random access memories by Wan Hasan, Wan Zuha, Abdul Halim, Izhal, Mohd Sidek, Roslina, Othman, Masuri

    Published 2008
    “…The simulator allows a user through a GUI to select a March based test algorithm depending on the desired fault coverage and diagnostic resolution. …”
    Get full text
    Get full text
    Article
  5. 5

    Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm by Ahmad, Azmi, Ali, Borhanuddin M., Khatun, Sabira, Hassan, Azmi

    Published 2005
    “…In this paper we examine the performance of a micro-Genetic Algorithm-based multi-user detector. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    The performance of block codes in digital communication system: article / Nor Afzan Azmi by Azmi, Nor Afzan

    Published 2007
    “…This proposed algorithm was developed and simulated to evaluate the performance of handover procedure in order to minimize an unnecessary handover, enhance the system capacity and improve the user's QoS level in the femtocell networks. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…The developed algorithm is simulated in LTE-Sim simulator released 5 in terms of three QoS metrics (1) Packet Loss Ratio (2) Delay (3) Throughput. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Handover procedure between macrocell and femtocell in Long Term Evolution (LTE) network: article / Nurul Afzan Zakaria by Zakaria, Nurul Afzan

    Published 2013
    “…This proposed algorithm was developed and simulated to evaluate the performance of handover procedure in order to minimize an unnecessary handover, enhance the system capacity and improve the user's QoS level in the femtocell networks. …”
    Get full text
    Get full text
    Article
  10. 10

    Handover procedure between macrocell and femtocell in long term evolution (LTE) network / Nurul Afzan Zakaria by Zakaria, Nurul Afzan

    Published 2013
    “…This proposed algorithm was developed and simulated to evaluate the performance of handover procedure in order to minimize an unnecessary handover, enhance the system capacity and improve the user's QoS level in the femtocell networks. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Efficient signaling schedule for centralized and distributed scheduling algorithms for wimax multi-hop relay networks by Saqer, Ahmad Sabri Mousa

    Published 2012
    “…In order to evaluate the proposed algorithms and validate their efficiency for IEEE 802.16j networks, the authors simulated the algorithms in QualNet simulator. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An efficient fault syndromes simulator for SRAM memories by Wan Hasan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Othman, Masuri

    Published 2009
    “…The simulator allows a user through a GUI to select a March based test algorithm depending on the desired fault coverage and diagnostic resolution. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…Therefore, in this research work a new algorithm was proposed to enhance the capacity of the EDCA protocol and increase the number of the active voice users. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review by Al-Qadhi, Abdulrahman K., Latip, Rohaya, Chiong, Raymond, Athauda, Rukshan, Hussin, Masnida

    Published 2025
    “…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  18. 18

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…The proposed algorithm is evaluated using the WorkflowSim simulation with a real dataset. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Additionally, a simulator is used to evaluate the proposed methodology under different deployment scenarios and network conditions. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony by Mohd Izuddin Sipluk

    Published 2022
    “…In this project, a comparative evaluation of selected algorithms is done to ascertain their applicability, practicality, and adaptability in a cloud scenario. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise