Search Results - (( developing validating based algorithm ) OR ( wave applications optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…These results validate the algorithm's robustness, particularly under imperfect CSI conditions, where traditional methods often fail. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    STUDIES ON THE NONLINEAR INTERACTIONS ASSOCIATED WITH MOORED SEMI SUBMERSIBLE OFFSHORE PLATFORMS by NOUR ELFADUL ABBAS, YASSIR MOHAMMEDNOUR ELFADUL ABBAS

    Published 2011
    “…Based on the validated numerical algorithm, a number of parametric studies were conducted for investigating the contributions of various design parameters on the dynamics of moored semi submersibles. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Ageing oil well integrity assessment and rehabilitation / Ramesh Ramasamy by Ramesh , Ramasamy

    Published 2018
    “…The use of probabilistic methods on structural reliability is also proposed using the first-order method and computer-based Monte-Carlo and Bootstrap algorithms to address the uncertainties associated with the ageing wells. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Interferometric array planning using division algorithm for radio astronomy applications by Kiehbadroudinezhad, Shahideh

    Published 2017
    “…In the second scheme, a genetic algorithm is developed, in order to optimize a correlator array of antennas by using Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  14. 14

    Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors by Binajjaj, Saeed Ali Saeed

    Published 2010
    “…First, the algorithms‘ performances were evaluated using numerical simulation employing two different scanning geometries: limited and full view scanning geometries, where the applicability of these algorithms was accessed by comparing the reconstructed images with actual model. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. In this paper, an ant colony optimization (ACO) based WSN routing algorithm for IoT has been proposed and analyzed to enhance scalability, to accommodate node mobility and to minimize initialization delay for time critical applications in the context of IoT to find the optimal path of data transmission, improvising efficient IoT communications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20