Search Results - (( opnet simulation based algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- opnet simulation »
- simulation based »
- java application »
- mining algorithm »
-
1
Simulation model to improve QoS performance over fixed WiMAX using OPNET
Published 2013“…A Model was developed based on the proposed new distributed model (Master-Slave), the first scenario comprised of 3 Base Stations (BS) and thirty Subscriber Station (SS) with one Master BS selected by the designed algorithm (Nearest Neighborhood Algorithms). …”
Get full text
Get full text
Article -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
-
4
An event-driven simulation for highest urgency first (HUF) : a latency and modulation aware bandwidth allocation algorithm for WiMAX base stations.
Published 2013“…This research has focused at developing a discrete-event simulator to implement bandwidth allocation algorithms for a WiMAX base station.The highest urgency first algorithm has been utilized as a benchmark deployment algorithm in order to provide: dynamic downlink/uplink adjustment and latency guarantee for real-time applications. …”
Get full text
Get full text
Article -
5
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
6
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
7
Performance analysis of packets scheduling with preemptive / Norjanah Kastaman
Published 2008“…We implement a scheduler model and incorporate it into the IP layer output queues using OPNET 10.5 simulation tool. We measure the performance of the algorithms in terms of delay time, size of packet and overflow from different traffic flows during various time periods. …”
Get full text
Get full text
Thesis -
8
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
9
A discrete event framework for OFDMA relay-based cellular networks
Published 2014“…There are different simulator tools to address these needs such as NS2, OPNet, OMNet++, etc. …”
Get full text
Get full text
Get full text
Article -
10
Quality of service performances of three mobile ad hoc network protocols
Published 2009“…The protocols included the Dynamic Source Routing (DSR), Ad Hoc On-demand Distance Vector (AODV) and Temporally Ordered Routing Algorithm (TORA) protocol. The analysis had been done theoretically and through simulation using an Optimized Network Engineering Tools (OPNET) Modeler. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Quality of service management algorithms in WiMAX networks
Published 2015“…The DES is validated by comparing its results with the results obtained from Qualnet, OPNET,and C simulators. Substantial simulations have been extensively conducted to evaluate the performance of the proposed algorithms in comparison to the existing bandwidth and power management algorithms. …”
Get full text
Get full text
Thesis -
12
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…Validation of the algorithm via the “OPNET” modeler suite software simulation results analysis is also to be carried out to define the best gateway for mapping process. …”
Get full text
Get full text
Final Year Project -
15
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
16
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…Validation of the algorithm via the “OPNET” modeler suite software simulation results analysis is also to be carried out to define the best gateway for mapping process. …”
Get full text
Get full text
Final Year Project -
17
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed
Published 2014“…The new distributed Client-Server model was simulated in OPNET modeler 16.0 with multiple Base Stations (BSs), Subscribers Stations (SSs) and some Server BSs selected by the Nearest Neighborhood Algorithms using Orthogonal Frequency Division Multiplexing (OFDM) techniques and compared with the existing Centralized model using Frequency Division Multiplexing (FDM) techniques. …”
Get full text
Get full text
Conference or Workshop Item -
19
SNR-Based OLSR Routing Protocol for Wireless Mesh Networks
Published 2009“…The new metric has been implemented on the OLSR routing protocol module using OPNET simulator. The modified OLSR routing protocol is implemented in the comparison scenarios. …”
Get full text
Get full text
Thesis -
20
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis
