Search Results - (( using communication based algorithm ) OR ( using function method algorithm ))

Refine Results
  1. 1

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…Next, the Dynamic Demand Replacement Algorithm (DDRA) algorithm is used to place in-demand functions near the edge nodes periodically, while the proposed task scheduling algorithm - Maximum Revenue Bid (MRB) is used to give priority to tasks to maximise revenue near the edge. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Performance analysis of clustering based genetic algorithm by Najeeb, Athaur Rahman, Aibinu, Abiodun Musa, Nwohu, M. N., Salami, Momoh Jimoh Eyiomika, Salau, H Bello

    Published 2016
    “…The proposed CGA on which the performance analysis of this paper is based involve the use of two centroids based clustering technique as a new method of chromosomes selection at the reproduction stage in a typical Genetic Algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network by Gumaida, Bassam, Abubakar, Adamu

    Published 2024
    “…Methods: It is suggested that the objective function that will be optimized using NMM is the mean squared error of the range of all neighboring anchor nodes installed in the studied WSNs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Two encryption functions in PHP has been used for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Perceptual speech enhancement exploiting temporal masking properties of human auditory system by Gunawan, Teddy Surya, Ambikairajah, Eliathamby, Epps, Julien

    Published 2010
    “…Objective evaluation using PESQ revealed that using the proposed forward masking model, the speech enhancement algorithm outperforms the other algorithms by 6–20% depending on the SNR. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    PAPR Reduction Using Genetic Algorithm (GA) In OFDM System by Mohd Ramdan, Fatin Najwa Nursyadza

    Published 2018
    “…In this thesis, a Genetic algorithm (GA) technique is proposed. GA is a type of optimization algorithm, which is natural-based selection and is used to find the optimal solution to the computational problem that maximizes or minimizes a particular function. …”
    Get full text
    Get full text
    Monograph
  8. 8

    The compact genetic algorithm for likelihood estimator of first order moving average model by Al-Dabbagh, R.D., Baba, M.S., Mekhilef, Saad, Kinsheel, A.

    Published 2012
    “…Recently Genetic Algorithms (GAs) have frequently been used for optimizing the solution of estimation problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Genetic algorithm techniques for the design of nonlinear microwave circuits by Arsat, Rashidah

    Published 2004
    “…In this report a hybrid method of Sample Balance Genetic Algorithm (SBGA) used to analyze nonlinear diode excited by RF circuit. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification by Fajila, Fathima, Yusof, Yuhanis

    Published 2024
    “…The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Vertical handover decision schemes in fourth generation heterogeneous cellular networks: A comprehensive study by Hushairi, Zen, Adnan, Mahmood, Shadi, M. S. Hilles

    Published 2018
    “…RSS based algorithms, bandwidth based algorithms, cost function based algorithms, and the combination algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects by Olanrewaju, Rashidah Funke, Islam, Thouhedul, Khalifa, Othman Omran, Fajingbesi, Fawwaz Eniola

    Published 2018
    “…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method by Hasan, Nurul

    Published 2010
    “…We introduce a modified cluster based model by using special nodes called server nodes (SN) that is powerful in term of resources. …”
    Get full text
    Get full text
    Citation Index Journal
  17. 17
  18. 18

    High performance visualization of human tumor growth software by Alias, Norma, Mohd. Said, Norfarizan, Khalid, Siti Nur Hidayah, Sin, Dolly Tien Ching, Phang, Tau Ing

    Published 2008
    “…The result of finite difference approximation (explicit, Crank-Nicolson and fully implicit methods) will be presented graphically. The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    High performance simulation for brain tumors growth using parabolic equation on heterogeneous parallel computer systems by Pheng, H. S., Alias, Norma, Mohd. Said, Norfarizan

    Published 2007
    “…The implementation of parallel algorithm based on parallel computing system is used to capture the growth of brain tumour. …”
    Get full text
    Get full text
    Article
  20. 20

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
    Get full text
    Get full text
    Get full text
    Article