Search Results - (( rate estimation path algorithm ) OR ( parameter evaluation method algorithm ))

Refine Results
  1. 1

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…A new mutation vector inspired by the two-opposite path (2-Opt) algorithm with adaptive mutation scalar (F ) and crossover rate (CR) control parameters were employed to enhance the exploration and exploitation phases of the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Active measurement techniques performed by overlay nodes can provide bandwidth estimations of an end-to-end overlay path. This thesis describes a new algorithm called “COPPA,” which is an in-band path probing algorithm for measuring the end-to-end available bandwidth of an overlay path accurately and continuously. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Identification and mitigation of non-line-of-sight path effect using repeater for hybrid ultra-wideband positioning and networking system by Chung, Gwo Chin, Mohd. Aqmal Syafiq Kamarudin, Lee, It Ee, Tan, Soo Fun

    Published 2021
    “…Although UWB positioning offers precise locality tracking, the accuracy of the estimation is greatly affected by the non-line-of-sight (NLOS) path effect. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Coordinate-Descent Adaptation over Hamiltonian Multi-Agent Networks by Azam Khalili, Vahid Vahidpour, Amir Rastegarnia, Ali Farzamnia, Teo, Kenneth Tze Kin, Saeid Sanei

    Published 2021
    “…To implement the ILMS algorithm, each node needs to receive the local estimate of the previous node on the cycle path to update its own local estimate. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET by Hemalatha, S., Kshirsagar, P.R., Manoharan, H., Vasantha Gowri, N., Vani, A., Qaiyum, S., Vijayakumar, P., Tirth, V., Haleem, S.L.A., Chakrabarti, P., Teressa, D.M.

    Published 2022
    “…This scheme selects genuine node for routing path production, by using the node reward with dependence level estimating algorithm to compute every node trust level and resource range, to disconnect higher trust level node and lower trust level node; higher trust level node is a genuine node which performs secure communication. …”
    Get full text
    Get full text
    Article
  6. 6

    Development of low power viterbi decoder on complex programmable logic device platform by Abu, Mohd Azlan

    Published 2018
    “…For the path metric updater unit (PMU), the traditional method of Viterbi algorithm is to store the selected minimum value of branch metric in the memory unit. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm by Muthana, Shatha Abdulhadi, Ku Mahamud, Ku Ruhana

    Published 2023
    “…The gray relational grade (GRG) performance metric and the Friedman test were used to evaluate the algorithm’s performance. The Taguchi-GRA method that produced the new values for the algorithm’s parameters was shown to be able to provide a better multi-objective generator maintenance scheduling (GMS) solution. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Performance Enhancement Of Ultra-Wideband Power Control Using Ranging And Narrowband Interference Mitigation by Saeed, Rashid Abdelhaleem

    Published 2008
    “…In this thesis we propose a maximum likelihood algorithm enhanced with synchronization scheme to estimate the time delay of direct-path signal in NLOS multi-path fading environment and mean acquisition time. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Evaluation of lightning current parameters using measured lightning induced voltage on distribution power lines by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Osman, Miszaina

    Published 2019
    “…In this paper, an algorithm had been proposed to evaluate the lightning current parameters using measured voltage from overhead distribution lines based on lightning location obtained from lightning location system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
    Get full text
    Get full text
    Article
  13. 13

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Evaluation of Lightning Current Using Inverse Procedure Algorithm. by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Askari, Mohamad Tolou, Hajikhani, Maryam

    Published 2013
    “…The proposed method considers on all electromagnetic fields components and can evaluate full shape of current, velocity and constant parameters of current models in contrast with previous studies. …”
    Get full text
    Get full text
    Article
  16. 16

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review by Uddin, Mueen, Darabidarabkhani, Yasaman, Shah, Asadullah, Memon, Jamshed

    Published 2015
    “…The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…Cryptography has been proven to be the best method to secure a database. However there are many types of cryptography algorithm that has been established in the market. …”
    Get full text
    Get full text
    Thesis
  20. 20