Search Results - (( user evaluation ((based algorithm) OR (_ algorithm)) ) OR ( change simulation model algorithm ))
Search alternatives:
- change simulation »
- user evaluation »
- model algorithm »
-
1
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…The proposed algorithm with its variable length solution encoding enables moving the cloudlets among pre-defined locations, adding or removing them in order to increase the quality of service according to the change in the user density caused by user mobility. …”
Get full text
Get full text
Thesis -
3
-
4
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…The proposed algorithm is evaluated via computer simulation and modeling where its performance is verified against the few selected algorithms of the same nature. …”
Get full text
Get full text
Get full text
Article -
5
Adaptive linux-based TCP congestion control algorithm for high-speed networks
Published 2017“…The main contributions of this model are: First, to validate the simulation results of AF-based CCA by comparing them to the numerical results of this model and to the results of NewReno as a benchmark. …”
Get full text
Get full text
Thesis -
6
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
Published 2023“…Machine Learning (ML) has been shown to be an effective tool for trust evaluation in WSNs, offering several benefits over existing schemes such as greater adaptability, scalability, and accuracy since ML algorithms can analyze and learn from the data collected in real-time from multiple sources (sensor readings, network traffic, and user behavior) enabling them to dynamically adjust their decision-making criteria based on the current network conditions. …”
Get full text
Get full text
Article -
7
Channel selection strategies for co-existence between wimax and wifi
Published 2009“…NS2 simulation model is presented to evaluate the channel selection in scenarios with co-existing IEEE 802.16a and 802.11b network…”
Get full text
Get full text
Thesis -
8
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
Get full text
Get full text
Thesis -
9
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
Get full text
Get full text
Get full text
Article -
10
Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor
Published 2019“…Thus, the study is to explore how the recommendation engines will work and use user-based collaborative filtering as an algorithm for the movie recommendation. …”
Get full text
Get full text
Thesis -
11
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
Get full text
Get full text
Get full text
Thesis -
12
The Evaluation of Cyclostationarity-Based Spectrum Sensing in Multipath Fading Channel
Published 2010“…These algorithms were developed in context of WRAN 802.22; the first cognitive radio standard, for TV-PAL and wireless microphone as the primary users. …”
Get full text
Get full text
Conference or Workshop Item -
13
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…This algorithm developed to allow user to receive push notification effectively based on the location of user’s smartphone that can be detected by Bluetooth Smart Ready Technology (BLE). …”
Get full text
Get full text
Thesis -
14
Improving Adaptive Quality of Service for Multimedia Wireless Networks Using Hierarchical Networks Approach
Published 2004“…The performance of the system is evaluated through simulations of a cellular environment under three different scenarios. …”
Get full text
Get full text
Thesis -
15
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Likewise, it would be valuable if the proposed scheduling algorithms are evaluated on anticipated networks covering a large number of users in further research.…”
Get full text
Get full text
Thesis -
16
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…In its formulation, the algorithm considers the interests and preferences of users’ friends and faculty mates in addition to users’ own preferences. …”
Get full text
Get full text
Thesis -
17
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
18
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…In this paper, a number of algorithms are proposed and evaluated for FaaSBid model. …”
Get full text
Get full text
Get full text
Article -
19
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article -
20
