Search Results - (( user simulation based algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- simulation based »
- user simulation »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
PSAT : a pairwise test data generation tool based on simulated annealing algorithm
Published 2015“…This research is about the research on developing a Pairwise Test Data Generation Tool based on Simulated Annealing (SA) algorithm which named as PSAT. …”
Get full text
Get full text
Undergraduates Project Papers -
3
The performance of block codes in digital communication system: article / Nor Afzan Azmi
Published 2007“…In this project, handover algorithm between macrocell and femtocell has been proposed and developed based on User Equipment (UK) velocity and Receive Signal Strength (RSS). …”
Get full text
Get full text
Article -
4
Relationship based replication algorithm for data grid
Published 2014“…Such an approach overcomes existing algorithms that is based either on users request or resource capabilities as an individual. …”
Get full text
Get full text
Monograph -
5
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…It is performed by the scheduling algorithm implemented in the Long Term Evolution (LTE) base station, Evolved Node B. …”
Get full text
Get full text
Thesis -
6
Handover procedure between macrocell and femtocell in Long Term Evolution (LTE) network: article / Nurul Afzan Zakaria
Published 2013“…In this project, handover algorithm between macrocell and femtocell has been proposed and developed based on User Equipment (UK) velocity and Receive Signal Strength (RSS). …”
Get full text
Get full text
Article -
7
Handover procedure between macrocell and femtocell in long term evolution (LTE) network / Nurul Afzan Zakaria
Published 2013“…In this project, handover algorithm between macrocell and femtocell has been proposed and developed based on User Equipment (UE) velocity and Receive Signal Strength (RSS). …”
Get full text
Get full text
Thesis -
8
Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems
Published 2021“…The first algorithm is based on integrating the maximum product of effective channel gains and the maximum SIR with the PF principle (PF-MPECG-SIR) to select strong users in the first stage and weak users in the second stage. …”
Get full text
Get full text
Thesis -
9
A simulation tool to evaluate the usability of agent centric Resource-Event-Agent (REA) database modeling methodology: The development of revenue cycle in accounting information sy...
Published 2023“…Hence, agent derivation mathematical algorithms have been converted into a simulation tool which plays a vital role in performing qualitative analysis, which involves the analysis towards agent centric simulation system's usability from users' perspective. …”
Conference paper -
10
Utility-based non-cooperative power control game in wireless environment / Yousef Ali Mohammed Al-Gumaei
Published 2017“…The simulated analytical and numerical results of this thesis indicate that the proposed algorithms can achieve a significant reduction of the user’s transmit power and thus a mitigation of the overall interference. …”
Get full text
Get full text
Get full text
Thesis -
11
Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris
Published 2017“…The developed scheduling algorithm is accomplished in three methodological stages as follows: first, frequency domain was considered for efficient scheduling at Resource Blocks (RBs) to the users based on best Channel Quality Indicator (CQI) report send from mobile station called as User Equipment (UE) to the base station (eNodeB). …”
Get full text
Get full text
Get full text
Thesis -
12
Robust multi-user detection based on hybrid grey wolf optimization
Published 2020“…The simulation results show that the iteration times of the multi-user detector based on the proposed algorithm is less than that of genetic algorithm, differential evolution algorithm and Grey wolf optimization algorithm, and has the lower BER.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
13
Performance comparisons of sequential and asynchronous iterative water filling algorithm in cognitive smart grid communications
Published 2023Conference Paper -
14
Trajectory planning and simulation for 3d printing process
Published 2022“…The output of slicing algorithm will be used as input of infill generator to generate infill vertices based on the infill density and infill pattern that decided by users. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Interactive framework for dynamic modelling and active vibration control of flexible structures
Published 2008“…Simulation algorithms based on finite difference scheme in characterizing the dynamic behaviour of flexible structures with different boundary conditions are incorporated. …”
Get full text
Get full text
Article -
16
Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm
Published 2005“…GA works iteratively over a population of solution using crossover and mutation to simulate potential solution. In this paper we examine the performance of a micro-Genetic Algorithm-based multi-user detector. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
A fault syndromes simulator for random access memories
Published 2008“…The simulator allows a user through a GUI to select a March based test algorithm depending on the desired fault coverage and diagnostic resolution. …”
Get full text
Get full text
Article -
18
Encryption selection for WLAN IEEE802.11G
Published 2013“…In this study, MATLAB was used for the simulation and the parameters for the simulation were different size of text file, type of encryption algorithms and type of encryption protocols. …”
Get full text
Get full text
Thesis -
19
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
20
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…These stages are the Wavelet Transform based on pyramid algorithm, and the previous algorithms to apply this system on NSS and CSS networks. …”
Get full text
Get full text
Thesis
