Search Results - (( user evaluation method algorithm ) OR ( time simulation model algorithm ))*

Refine Results
  1. 1

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…The results showed that the parallel algorithms for EHD simulations may provide 4 to 5 times more speedup over sequential algorithm for large grid sizes. …”
    Get full text
    Get full text
    Thesis
  2. 2

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…The four prime aspects of this work are: firstly, a model of the grid scheduling problem for dynamic grid computing environment; secondly, development of a new web based simulator (SyedWSim), enabling the grid users to conduct a statistical analysis of grid workload traces and provides a realistic basis for experimentation in resource allocation and job scheduling algorithms on a grid; thirdly, proposal of a new grid resource allocation method of optimal computational cost using synthetic and real workload traces with respect to other allocation methods; and finally, proposal of some new job scheduling algorithms of optimal performance considering parameters like waiting time, turnaround time, response time, bounded slowdown, completion time and stretch time. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam by Asrul, Adam

    Published 2017
    “…Next, four recently introduced optimization algorithms are employed as feature selector, namely as 1) angle modulated simulated Kalman filter (AMSKF), 2) binary simulated Kalman filter (BSKF), 3) local optimum distance evaluated simulated Kalman filter (LocalDESKF), and 4) global optimum distance evaluated simulated Kalman filter (GlobalDESKF). …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…The dataset development for both algorithms is carried out via simulations in Graphical Network Simulator 3 (GNS3). …”
    text::Thesis
  5. 5
  6. 6

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
    text::Thesis
  7. 7

    3D virtual modelling and stabilization control of triple links inverted pendulum on two-wheeled system using enhanced interval type-2 fuzzy logic control by Muhammad Firdaus, Masrom

    Published 2020
    “…This modelling technique also allow provides visualization for user to evaluate the performance of the system. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian by Ali, Azuwa, Salian, Saiful Fadzli

    Published 2009
    “…Location positioning method chosen in L-SH is Observed-Time Difference of Arrival (OTDOA). Simulation model is developed and done using Matlab® in analyzing and comparing the performance of conventional handoff with L-SH. …”
    Get full text
    Get full text
    Research Reports
  9. 9

    GSM-WCDMA hybrid localization techniques in multilayer heterogeneous network / Muhammad Naqiuddin Hassan by Hassan, Muhammad Naqiuddin

    Published 2013
    “…The proposed method has been implemented and evaluated using simulation on MATLAB software under various mobility models. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach by Khan, T., Singh, K., Shariq, M., Ahmad, K., Savita, K.S., Ahmadian, A., Salahshour, S., Conti, M.

    Published 2023
    “…Machine Learning (ML) has been shown to be an effective tool for trust evaluation in WSNs, offering several benefits over existing schemes such as greater adaptability, scalability, and accuracy since ML algorithms can analyze and learn from the data collected in real-time from multiple sources (sensor readings, network traffic, and user behavior) enabling them to dynamically adjust their decision-making criteria based on the current network conditions. …”
    Get full text
    Get full text
    Article
  11. 11

    Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei by Hamid , Tahaei

    Published 2018
    “…The simulation results were then verified using statistical modelling and t-tests. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon

    Published 2015
    “…The main objective of this research is to validate the NIRR algorithm by developing a comprehensive simulation model using Discrete Event Simulation (DES). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon, Ahmad, Idawaty

    Published 2016
    “…The main objective of this research is to validate the NIRR algorithm by developing a comprehensive simulation model using Discrete Event Simulation (DES). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Power Delivery Network Modeling And Simulation By Using Delaunay-Voronoi Triangulation And The Latency Insertion Method by Chin, Wei Chun

    Published 2018
    “…The research is focused into the analysis of PDN by modeling and simulation of the power plane. In the project, power plane is modeled using Delaunay-Voronoi algorithm and for simulation, a fast transient simulation algorithm which is latency insertion method (LIM) is applied. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Simulating Electrohydrodynamic Ion-Drag Pumping on Distributed Parallel Computing Systems by Shakeel Ahmed, Kamboh, Zubair, Ahmed Kalhoro, Kashif, Ali Abro, Jane, Labadin

    Published 2017
    “…Findings: This results show that the parallel algorithm for EHD simulations may provide 4.14 times more speedup over sequential algorithm for large grid sizes. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Simulation Model and Genetic Algorithm to Assembly Line Balancing by Ali, A. J. Adham, Ahmad Nazif, Noor Kamar, Abdullah, Ibrahim, Sorooshian, Shahryar

    Published 2013
    “…The assembly line involves many famous problems that is unbalancing cycle time among the workstations. Simulation Model (SM) is one of the most useful modelling tool for the design of many types of systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…Relative mass release of the leakage is introduced as the input for the simulation model and the data from the simulation model is taken at real time (on-line) to feed into the recursive algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item