Search Results - (( basic simulation based algorithm ) OR ( using communication using algorithm ))

Refine Results
  1. 1

    Efficient transmission based on genetic evolutionary algorithm by Jin Fan, Kit Guan Lim, Helen Sin Ee Chuo, Min Keng Tan, Ali Farzamnia, Kenneth Tze Kin Teo

    Published 2022
    “…In this paper, an energy-saving mechanism based on genetic algorithm in wireless sensor network (WSN) is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  2. 2

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…The simulation process was conducted using Network Simulator-3 (NS-3) and the performance of these packet scheduling algorithms were evaluated based on the performance metrics of throughput, delay, packet loss ratio (PLR), energy consumption rate (ECR), and EE for the voice over IP (VoIP), video and File Transfer Protocol (FTP) applications. …”
    Get full text
    Get full text
    Thesis
  3. 3

    The design and applications of the african buffalo algorithm for general optimization problems by Odili, Julius Beneoluchi

    Published 2017
    “…Some of the successfully designed stochastic algorithms include Simulated Annealing, Genetic Algorithm, Ant Colony Optimization, Particle Swarm Optimization, Bee Colony Optimization, Artificial Bee Colony Optimization, Firefly Optimization etc. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.] by Che Abdullah, Sukarnur, Amari, Mohamad Dzulhelmy, Mat Jusoh, Mohammad Azzeim, Amirudin, Irfan Syahmi Rusyaidi, Zainalabidin, Ashraf

    Published 2025
    “…This motivates our initiative to develop a simulation of a cross-belt conveyor system. The algorithms for the conveyor system were implemented using C# within Visual Studio and Unity environments. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…In order to solve this problem, a simulation based “Multi-Colony Global Particle Swarm Optimization (MC-GPSO)” algorithm was developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A calibration framework for swarming ASVs' system design by Zainal Abidin, Zulkifli

    Published 2012
    “…This paper is concerned with the virtual simulation of Autonomous Surface Vessels (ASVs) named, Drosobots, using virtual simulation software i. e. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Active contour model on digital mammograms using low-cost parallel computing systems by Ibrahim, Arsmah, Alias, Norma, Sulaiman, Hanifah, Yasiran, Siti Salmah

    Published 2009
    “…In this system four processors are used that communicate via Ethernet network using LINUX as the operating system and Matlab Distributed Computing Engine (MDCE) as a platform to process the digital mammograms. …”
    Get full text
    Book Section
  13. 13

    Simulation of quantum growing network / Ong Boon Teong by Ong , Boon Teong

    Published 2003
    “…Should it be possible to build a microprocessor which fully exploits quantum mechanics then it may be possible to carry out such factorisations in remarkably less time. The RSA algorithm, a widely used encryption system, is safe only if such factorisations cannot be performed quickly. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Enhanced Mobility Solution In Mobile Ipv6 Network by David, Adeniji Oluwashola

    Published 2008
    “…The interface selection algorithm was based on NEMO implementation structure using a technique of mutihoming which was extended to MIPv6 concepts The outcome of this research work are: a designed policy protocol for policy messages communication between the Mobile Router and the Home Agent, the framework is simulated using Network Simulator (NS2) with an extension of mobiwan, the result shows the end to end delay, average end to end delay, overhead, optimal routing path, average inter-packet latency and throughput of the developed system. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Design and evaluation of a high-performance extensible DC-DC converter integrated with ANN based MPPT controller by Motakabber, S. M. A., Akter, Khadiza, Alam, A. H. M. Zahirul, Yusoff, Siti Hajar

    Published 2023
    “…Artificial Neural Networks (ANN) based algorithm is used in the construction of Maximum Power Point Tracking (MPPT) controllers as they are thought to be a faster, more accurate, and more reliable estimating technique than other techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    A NEW ENERGY EFFICIENT ADAPTIVE HYBRID ERROR CORRECTION TECHNIQUE FOR UNDERWATER WIRELESS SENSORS NETWORKS by HASSAN, AMMAR ELYAS BABIKER HASSAN

    Published 2011
    “…The technique uses an adaptation algorithm which depends on a pre-calculated packet acceptance rate (PAR) ranges look-up table, current PAR, packet length and current error correction technique used. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Autonomous path planning robot using geographical information by Ismail Ishaq Ibrahim

    Published 2008
    “…After the simulation using Matlab, the algorithm will then be implemented in the robot using basic stamp to run the mobile robot. …”
    Get full text
    Learning Object
  19. 19

    Mitigating malicious nodes using trust and reputation based model in wireless sensor networks by Abdullah, Muhammad Daniel Hafiz

    Published 2018
    “…This research aims to increase the accuracy of node trustworthiness evaluation process in order to helps node to make more informed decision prior to establish secure communications. In order to achieve this, different sets of trust information including QoS, OSNs and ant colony system (ACS) algorithm are proposed to improve the selection of trustworthy node. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Deterministic phase sequence approach for peak to average power ratio reduction in orthogonal frequency division multiplexing systems by Kazemian, Mohsen

    Published 2016
    “…Simulations are based on IEEE 802.16e, Quadrature Phase Shift Keying (QPSK) modulation and performed with a power amplifier with memory effects. …”
    Get full text
    Get full text
    Thesis