Search Results - (( user evaluation based algorithm ) OR ( change simulation model algorithm ))

Refine Results
  1. 1

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…The proposed algorithm is evaluated via computer simulation and modeling where its performance is verified against the few selected algorithms of the same nature. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Adaptive linux-based TCP congestion control algorithm for high-speed networks by Alrshah, Mohamed A.

    Published 2017
    “…The main contributions of this model are: First, to validate the simulation results of AF-based CCA by comparing them to the numerical results of this model and to the results of NewReno as a benchmark. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach by Khan, T., Singh, K., Shariq, M., Ahmad, K., Savita, K.S., Ahmadian, A., Salahshour, S., Conti, M.

    Published 2023
    “…This paper presents a Machine Learning (ML)-based trust evaluation model in the unattended autonomous WSN environment to achieve reliability, adaptability, scalability, and accuracy by generating quick and reliable trust values dynamically. …”
    Get full text
    Get full text
    Article
  7. 7

    Utilization of canny and velocity bunching algorithms for modelling shoreline change by Marghany, Maged, Hashim, Mazlan

    Published 2006
    “…There is significant relationship between shoreline change rate estimated using Canny algorithm and ones modeled using velocity bunching model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor by Mat Ishor, Nur Ayuni Izlin

    Published 2019
    “…Thus, the study is to explore how the recommendation engines will work and use user-based collaborative filtering as an algorithm for the movie recommendation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Modeling And Simulation Of Photovoltaic Module With Enhanced Perturb And Observe MPPT Algorithm Using Matlab/Simulink by Al-Shetwi, Ali Q., Muhamad Zahim, Sujod

    Published 2016
    “…Modeling and analysis of photovoltaic (PV) system is substantial for designers of solar power plants to do a yield investigation that precisely predicts the expected output power under changing weather conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    The Evaluation of Cyclostationarity-Based Spectrum Sensing in Multipath Fading Channel by Jeoti , Varun

    Published 2010
    “…These algorithms were developed in context of WRAN 802.22; the first cognitive radio standard, for TV-PAL and wireless microphone as the primary users. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Power Delivery Network Modeling And Simulation By Using Delaunay-Voronoi Triangulation And The Latency Insertion Method by Chin, Wei Chun

    Published 2018
    “…The research is focused into the analysis of PDN by modeling and simulation of the power plane. In the project, power plane is modeled using Delaunay-Voronoi algorithm and for simulation, a fast transient simulation algorithm which is latency insertion method (LIM) is applied. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Application of the Whale Optimization Algorithm (WOA) in Reservoir Optimization Operation Under Investigation of Climate Change Impact: A Case Study at Klang Gate Dam, Malaysia by Lai V., Huang Y.F., Koo C.H., Ahmed A.N., El-Shafie A.

    Published 2024
    “…The effectiveness of analyzing large amounts of data that comes with engaging climate change scenarios, for planning advanced reservoir management can be achieved through the use of optimization algorithms. …”
    Conference Paper
  18. 18

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…This algorithm developed to allow user to receive push notification effectively based on the location of user’s smartphone that can be detected by Bluetooth Smart Ready Technology (BLE). …”
    Get full text
    Get full text
    Thesis
  19. 19

    IMPLEMENTATION OF NOISE CANCELLATION WITH HARDWARE DESCRIPTION LANGUAGE by SUN, LEE KUANG

    Published 2006
    “…The project is divided into four main parts: research, Matlab simulation, ModelSim simulation and hardware implementation. …”
    Get full text
    Get full text
    Final Year Project
  20. 20