Search Results - (( user evaluation ((path algorithm) OR (based algorithm)) ) OR ( _ distribution a algorithm ))*
Search alternatives:
- user evaluation »
- path algorithm »
- distribution a »
- a algorithm »
-
1
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…The performance of the proposed routing algorithm is evaluated utilizing MATLAB. The assessment results indicate that it can find the forwarding path with comparatively low cost in the premise of ensuring security and has minimized the average energy consumption by nearly 50% even as the number of nodes has increased, when compared with the traditional ACO algorithm, an existing ant colony based routing algorithm and a current routing protocol for IoT.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network
Published 2019“…The element of Shortest Path First (SPF) Algorithm that is used in a routing protocol will be implemented. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
4
Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria
Published 2018“…Dijkstra’s Algorithm is a shortest path algorithm that considers a single criterion only. …”
Get full text
Get full text
Get full text
Article -
5
Efficient signaling schedule for centralized and distributed scheduling algorithms for wimax multi-hop relay networks
Published 2012“…On the other hand, the proposed distributed scheduling algorithm (MR-DSA) was evaluated by comparing its performance against performances of Greedy and the factor-graph-based low-complexity distributed scheduling algorithm (FGDS) algorithms in terms of delay, throughput, and overhead. …”
Get full text
Get full text
Thesis -
6
Vision-based robot indoor navigation
Published 2022“…An algorithm is developed in the computer to achieve image processing, user input, path planning, simulation, and writing of output files. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
AUTOMATED GUIDED ROBOT (AGR)
Published 2007“…Algorithm conversion to C code programming has been done throughout the project for the obstacle avoidance and path planning algorithms based upon the GA platform ofAI.…”
Get full text
Get full text
Final Year Project -
8
A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network
Published 2015“…On the second level, TOPSIS algorithm allocates the resources among application's users based on their criteria and the application's preferences. …”
Get full text
Get full text
Get full text
Article -
9
The Effect of Rainfall on the UAV Placement for 5G Spectrum in Malaysia
Published 2023“…The problem of finding the UAV 3D placement is formulated with the objective to minimize the total path loss between the UAV and all users. The problem is solved by invoking two algorithms, namely Particle Swarm Optimization (PSO) and Gradient Descent (GD) algorithms. …”
Article -
10
Performance Enhancement Of Ultra-Wideband Power Control Using Ranging And Narrowband Interference Mitigation
Published 2008“…Power control is a critical parameter for the design and evaluation of ultra-wideband (UWB) based ad-hoc networks due to its distributed control nature and non-fixed topology. …”
Get full text
Get full text
Thesis -
11
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…Therefore, in this research work a new algorithm was proposed to enhance the capacity of the EDCA protocol and increase the number of the active voice users. …”
Get full text
Get full text
Get full text
Thesis -
12
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
Get full text
Get full text
Article -
13
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article -
14
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…Experimental evaluation confirmed that the proposed grid scheduling algorithms possess a high degree of optimality in performance, efficiency and scalability.…”
Get full text
Get full text
Thesis -
15
Priority based fair scheduling : Enhancing efficiency in cloud job distribution
Published 2023“…These metrics were chosen to evaluate and analyze the effectiveness of the proposed scheduling algorithm.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…In MEC environment, cloudlets that represent a relatively powerful computing resource can be collocated with the base station to enable good coverage of computing service due to the high demand and random distribution of users. …”
Get full text
Get full text
Thesis -
17
Replica Creation Algorithm for Data Grids
Published 2012“…This thesis presents a new replication algorithm that improves data access performance in data grids by distributing relevant data copies around the grid. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Tensor-based Hidden Semi-Markov Model for CPSS user activity analysis and services
Published 2025“…Moreover, to effectively address the three basic micro-services in CPSSs - evaluation, learning, and prediction - we develop tensor-based algorithms, including the Forward-Backward, Baum-Welch, and Viterbi algorithms, for the proposed T-HSMM. …”
Get full text
Get full text
Get full text
Article -
19
Balanced femtocell model to enhance indoor coverage in LTE cellular network / Izwah Ismail
Published 2018“…Hence the Cognitive Femtocell (CogFem) network has been proposed based on the greedy algorithm to allow unlicensed users to exploit spectrum opportunities from primary systems to enhance the spectrum utilization and mitigate interference. …”
Get full text
Get full text
Book Section -
20
Balanced femtocell model to enhance indoor coverage in LTE cellular network / Izwah Ismail
Published 2017“…Hence the Cognitive Femtocell (CogFem) network has been proposed based on the greedy algorithm to allow unlicensed users to exploit spectrum opportunities from primary systems to enhance the spectrum utilization and mitigate interference. …”
Get full text
Get full text
Thesis
