Search Results - (( wolf optimization mead algorithm ) OR ( rate information sharing algorithm ))
Search alternatives:
- information sharing »
- wolf optimization »
- optimization mead »
- sharing algorithm »
- rate information »
- mead algorithm »
-
1
-
2
Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems
Published 2021“…To solve this problem, a new cooperative NOMA system is introduced, in which we first, propose a receiver equalizer at weak user known as weak user beam-matching (WBM) equalizer based on deviceto- device (D2D) channel state information (CSI) sharing between the nearby strong and weak users. …”
Get full text
Get full text
Thesis -
3
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…Thus, the proposed algorithms enhance the performance of the search by reducing redundant messages, increasing the success rate and decreasing latency. …”
Get full text
Get full text
Thesis -
4
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Therefore, in order to improve bandwidth fairness along with efficient optimization to alleviate this problem, we propose two marker algorithms; a Double Modified Double Improved time sliding window Three Colour Marker (M2I2TSWTCM) algorithm, which makes a new value of that depends on the logarithm peak information rate (PIR) and which is added to the adaptive factor that exists in the previous algorithm. …”
Get full text
Get full text
Thesis -
5
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Several experiments were carried out using the OMNeT++ simulation framework. The designed algorithm was evaluated using experimental data. The obtained results show that the continuous in-band overlay path probing algorithm (COPPA) provides up-to-date bandwidth information with reduced overhead and minimal impact on the traffic of the path.…”
Get full text
Get full text
Thesis -
6
Performance evaluation of task scheduling using hybrid meta-heuristic in the heterogeneous cloud environment
Published 2019“…Cloud computing is a platform in which it provides services, information and software over the Internet. The essential role of cloud computing is enabling sharing of resources on-demand over the network (e.g. servers, applications, storage, services and database) to the end-users that are distributed geographically. …”
Get full text
Get full text
Thesis -
7
-
8
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
9
Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid
Published 2020“…Besides that, the text in reviews convey better information than the rating alone thus encourages deeper study on the review content. …”
Get full text
Get full text
Thesis -
10
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
11
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm achieved an average of 87% precision, 83% of recall, 85% of F-score and 82% of accuracy rate.…”
Get full text
Get full text
Thesis -
12
A study on personalized recommender system using social media
Published 2020“…These machine learning algorithm processes the data set obtained. The evaluation on these algorithm is done to evaluate accuracy of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…This proposed study describes the steps of digital signal processing on electrocardiogram (ECG) and the security of the ECG signal by using Fully Homomorphic Encryption (FHE). Sharing the patient’s information through the Internet of Thing (IoT) for faster diagnosis has security and privacy issues. …”
Get full text
Get full text
Article -
14
-
15
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…Together, these methods tackle critical gaps in resource allocation, including the trade-off between energy efficiency and data rate, and the challenges posed by both perfect and imperfect channel state information (CSI). …”
Get full text
Get full text
Get full text
Thesis -
16
Evaluating A New Adaptive Group Lasso Imputation Technique For Handling Missing Values In Compositional Data
Published 2024“…Pie chart is a widely used statistical chart to represent the proportions of various components in a certain entity. The shares of data in a pie chart, also known as compositional data, consist of non-negative values, containing only relative information. …”
Get full text
Get full text
Thesis -
17
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
18
Adaptive and optimized radio resource allocation algorithms for OFDMA based networks
Published 2015“…AORAA contains an adaptive and optimized subcarrier allocation algorithm which uses graph theoretic techniques to do the best probable matching of subcarrier and users’ channel information. …”
Get full text
Get full text
Thesis -
19
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…The secure node authentication algorithm prevents attacks from accessing the network. …”
Get full text
Get full text
Article -
20
Protein Sequences Classification Using Modular RBF Neural Networks
Published 2002“…The intelligent classification techniques described in this paper aims to enhance the performance of single neural classifiers based on a centralized information structure in terms of recognition rate, generalization and reliability. …”
Get full text
Get full text
Get full text
Book Chapter
