Search Results - (( parameter evaluation window algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- parameter evaluation »
- application stemming »
- stemming algorithm »
- evaluation window »
- window algorithm »
- java application »
-
1
An optimized aggregate marker algorithm for bandwidth fairness improvement in classifying traffic networks
Published 2016“…This article analyses and evaluates a new time sliding window traffic marker algorithm called the Optimized time sliding window Three Colour Marker (OtswTCM). …”
Get full text
Get full text
Get full text
Article -
2
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…Through the proposed algorithm, the Minimum Contention Window (CWmin) and Arbitration Inter Frame Space (AIFS) parameters were adapted based on the percentage of the collision in the network. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm
Published 2023“…In any metaheuristic, the parameter values strongly affect the efficiency of an algorithm’s search. …”
Get full text
Get full text
Get full text
Article -
4
Design of intelligent Qira’at identification algorithm
Published 2017“…The process of the SPAP Algorithm is to extend parameters of the Affine Projection Block with two different selections of windowing length that affect the final accuracy on pattern classification. …”
Get full text
Get full text
Thesis -
5
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…The algorithm development combines the frameworks from Phases 1 to 3, evaluating real and synthetic datasets. …”
Get full text
Get full text
Get full text
Thesis -
6
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, propose an Optimized Time Sliding Window based Three Colour Marker. Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
7
Efficient back-off mechanism for multimedia support in IEEE 802.11E
Published 2012“…The performance evaluations are conducted by using NS-2 simulator. The simulation results demonstrate that the proposed algorithm has greatly outperformed the previous mechanisms such as the non-linear dynamic adaptation scheme of the minimum contention window (CWmin HA), dynamic adaptation algorithm of the maximum contention window (CWmax adaptation), Adaptive Enhanced Distributed Coordination Function (AEDCF), Random adaptive MAC parameters scheme RAMPS and the conventional EDCA mechanism. …”
Get full text
Get full text
Thesis -
8
An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani
Published 2015“…The urban growth images obtained are analysed to improve existing classification algorithms. The improved algorithm is constructed by adding new parameter and classification rule to existing algorithm. …”
Get full text
Get full text
Thesis -
9
An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection
Published 2022“…Then, the Hann algorithm is employed to window the traffic signal, and facilitates damping the MIMO impact for different waveforms. …”
Get full text
Get full text
Article -
10
An efficient battery lifetime aware power saving (EBLAPS) mechanism in IEEE 802.16e networks
Published 2015“…The battery lifetime-aware power saving (BLAPS) scheme has been created to prolong the battery life of an MSS by adaptively adjusting the three-sleep parameters named idle threshold, initial sleep window, and final sleep window according to the residual energy and the traffic load. …”
Get full text
Get full text
Article -
11
An efficient backoff algorithm for IEEE 802.15.4 wireless sensor networks
Published 2014“…EBA-15.4MAC is designed based on two new techniques; firstly, it updates the contention window size based on the probability of collision parameter. …”
Get full text
Get full text
Article -
12
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
Published 2024“…The simulation results demonstrated that the proposed algorithms significantly outperformed the benchmark algorithms across several metrics. …”
Get full text
Get full text
Get full text
Thesis -
13
Hearing disorder detection using auditory evoked potential (AEP) signals
Published 2020“…Ten different statistical features have been extracted in ten different time window length (one second to ten seconds). The obtained feature sets have been classified by the K-Nearest Neighbors (K-NN) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
Published 2013“…EBA-15.4MAC is based on two new important techniques; firstly, it updates he contention window size based on the probability of collision parameter. …”
Get full text
Get full text
Thesis -
15
Traffic management algorithms for LEO satellite networks
Published 2016“…In order to evaluate the proposed algorithm, a series of experiments to implement Discrete Event Simulation (DES) of a LEO satellite network by using ns-2 and C/C++ are conducted. …”
Get full text
Get full text
Get full text
Thesis -
16
Adaptive linux-based TCP congestion control algorithm for high-speed networks
Published 2017“…Second, to study the impact of ʎmax parameter on the throughput and epoch time. Third, to formulate an equation to automate the configuration of ʎmax parameter in order to increase the scalability of AF-based CCA. …”
Get full text
Get full text
Thesis -
17
Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic
Published 2012“…The blogs search engine consists of three main phases which are crawling using RSS feeds algorithm, indexing weblogs algorithm and searching technique with Fuzzy logic. …”
Get full text
Get full text
Get full text
Thesis -
18
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…We then conduct a comparative analysis toward estimating the running time during the encryption and decryption process. We also evaluate the memory cost for system parameters and accumulators. …”
Get full text
Get full text
Thesis -
19
Context enrichment framework for sentiment analysis in handling word ambiguity resolution
Published 2024“…The WAR model identifies ambiguous words and generates context terms with a window size of three to resolve its ambiguity. The similarity between ambiguous words and their context words is evaluated using the cosine similarity approach. …”
Get full text
Get full text
Thesis -
20
Adaptive array antenna design for wireless communication systems
Published 2013“…In the first part, beamforming algorithms using different performance criteria, which include maximum signal-to noise-ratio (SINR), minimum (mean-square Error) MSE and power minimisation, are evaluated. …”
Get full text
Get full text
Thesis
