Search Results - (( developing function based algorithm ) OR ( service application using algorithm ))
Search alternatives:
- developing function »
- service application »
- using algorithm »
-
1
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2017“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Book Section -
2
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023“…In this work, a new microcontroller board was designed and developed with Genetic Algorithm (GA) embedded on board. …”
Conference paper -
3
Modelling and optimization of a transit services with feeder bus and rail system / Mohammadhadi Almasi
Published 2015“…In this study, optimized transit services and coordinated schedules are developed using metaheuristic algorithms such as genetic algorithm (GA), particle swarm optimization (PSO), water cycle algorithm (WCA) and imperialist competitive algorithm (ICA). …”
Get full text
Get full text
Thesis -
4
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
5
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
Get full text
Get full text
Get full text
Thesis -
6
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
Get full text
Get full text
Thesis -
7
A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm
Published 2015“…The model is simple in application with the use of genetic algorithm for model calibration making use of only the material fatigue limit. …”
Get full text
Get full text
Thesis -
8
RSSI Fingerprinting Approach for Location-Based Services
Published 2006“…For the first half of the project duration which is this semester, I mainly focus on the problem of localization. Therefore, based on my knowledge and developed tools in localization, I can further develop a locationbased service system. …”
Get full text
Get full text
Final Year Project -
9
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…To improve the proposed algorithm, GA was utilized to identify the best choice for ‘‘mother wavelet function” and “decomposition level” of the signals by means of the fundamental fitness function. …”
Get full text
Get full text
Get full text
Thesis -
10
Statistically controlled robust trust computing mechanism for cloud computing
Published 2014“…Trust computing mechanisms can play an important role in identifying the right service providers who would meet the commitments specified in the Service Level Agreements.Literature has reported several trust computing mechanisms for different distributed systems based on various algorithms and functions.Almost all of them modify the trust scores monotonously even for momentary performance deviations that are reported.This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores using a hysteresis based algorithm.Hence the proposed mechanism can protect the trust scores from changes due to momentary fluctuations in system performances.The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long-term system performance than the ones that were computed without the validation of the inputs.…”
Get full text
Get full text
Get full text
Article -
11
Efficient terrain coverage for deploying wireless sensor nodes on multi-robot system
Published 2016“…Developing an exploration algorithm based on spanning tree is the main contribution and this exploration algorithm is performing fast localization of sensor nodes in energy efficient manner. …”
Get full text
Get full text
Get full text
Article -
12
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
13
Document ranking using information quality criteria in weblog search engine
Published 2013“…This thesis proposes two ranking functions in the search engine which are combined with the information quality criteria, and then compared with a PageRank based ranking function. …”
Get full text
Get full text
Thesis -
14
Effective downlink resource management for wimax networks
Published 2018“…Our EDRM framework involves three functions: Class-Based Scheduling (CBS) algorithm, Dynamic Bandwidth Allocation (DBA) scheme and Link Session Management (LSM) policy. …”
Get full text
Get full text
Thesis -
15
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…Distributed Service (or resource) Discovery (DSD) is becoming an important research area in Service Oriented Computing (SOC) because many software applications are now developed with services from different vendors. …”
Get full text
Get full text
Thesis -
16
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…Due to its significant function, whereby a conversion of manual procedure into a web based module is necessary, this module will be effective and brings benefits to the authorities, Halal logistic service providers and also users.…”
Get full text
Get full text
Thesis -
17
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems
Published 2015“…This article discusses trade-view model of HTM5 methodology and its use in developing a cloud robotic ecosystem that implements peerto- peer, contract based economy. …”
Get full text
Get full text
Article -
18
CYCLOSTATIONARY FEATURES OF PAL TV AND WIRELESS MICROPHONE FOR COGNITIVE RADIO APPLICATIONS
Published 2010“…We obtain the cyclostationary features of these primary signals using spectral correlation function. Based on these features, we develop two algorithms for spectrum sensing and their performances are evaluated in comparison with energy detector which is considered as the standard simple detector. …”
Get full text
Get full text
Thesis -
19
Integration Of Travel Time Zone For Optimal Siting Of Emergency Facilities
Published 2008“…In a fine resolution of demand points, percentages of coverage based on z and A values were not much different. …”
Get full text
Get full text
Thesis -
20
Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin
Published 2016“…The project achieve objectives by using RAD (Rapid Application Development) approach as the guideline and by making sure that this application is filled with great user experiences and functionality goals. …”
Get full text
Get full text
Thesis
