Search Results - (( using communication using algorithm ) OR ( using function based algorithm ))
Search alternatives:
- using communication »
- communication using »
- using algorithm »
- using function »
-
1
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
Get full text
Get full text
Get full text
Article -
2
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
3
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…An alternative approach to training neural network-based equalizers is to use metaheuristic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
An efficient computation technique for cryptosystems based on Lucas functions
Published 2008Get full text
Get full text
Conference or Workshop Item -
5
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis -
6
Investigation of gateway placement optimization approaches in wireless mesh networks using genetic algorithms
Published 2014“…The investigation result shows that the genetic algorithms based approaches on solving gateway optimization problem relatively outperform many other approaches in addition to that the strength of the genetic algorithm depends on the fitness function which is used in measuring the quality of the individuals (fitness value).…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Performance analysis of clustering based genetic algorithm
Published 2016“…The proposed CGA on which the performance analysis of this paper is based involve the use of two centroids based clustering technique as a new method of chromosomes selection at the reproduction stage in a typical Genetic Algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Comparison analysis of stream cipher algorithms for digital communication
Published 2007“…By using a common key length and worst case conditions, the strength of several stream cipher algorithms are evaluated using statistical tests, correlation attack, linear complexity profile and nonstandard test. …”
Get full text
Get full text
Get full text
Article -
9
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Review of Multi-Objective Swarm Intelligence Optimization Algorithms
Published 2021“…The review is based on how the algorithms deal with objective functions using MOO approaches, the benchmark MOPs used in the evaluation and performance metrics. …”
Get full text
Get full text
Article -
11
Perceptual speech enhancement exploiting temporal masking properties of human auditory system
Published 2010“…Objective evaluation using PESQ revealed that using the proposed forward masking model, the speech enhancement algorithm outperforms the other algorithms by 6–20% depending on the SNR. …”
Get full text
Get full text
Get full text
Article -
12
Hybrid Improved Bacterial Swarm Optimization Algorithm for Hand-Based Multimodal Biometric Authentication System
Published 2019“…In the proposed HIBS algorithm, the slow convergence of BFO algorithm was mitigated by using the random walk procedure of Firefly algorithm as an adaptive varying step size instead of using fixed step size. …”
Get full text
Get full text
Article -
13
Embedded Ethernet System For Real-Time Communication
Published 2018“…The Ethernet network model is used to analyze the performance of the backoff algorithm in a different number of nodes. …”
Get full text
Get full text
Monograph -
14
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
Get full text
Get full text
Thesis -
15
Searching Malay text using stemming algorithm
Published 2004“…The retrieved web pages are weighted and ranked using inverse document frequency function. The retrieval effectiveness is measured using standard recall and precision. …”
Get full text
Get full text
Get full text
Article -
16
PAPR Reduction Using Genetic Algorithm (GA) In OFDM System
Published 2018“…In this thesis, a Genetic algorithm (GA) technique is proposed. GA is a type of optimization algorithm, which is natural-based selection and is used to find the optimal solution to the computational problem that maximizes or minimizes a particular function. …”
Get full text
Get full text
Monograph -
17
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
Published 2019“…Therefore this research proposed a novel model for artificial neuro-glial networks and swarm-inspired algorithm for autonomous robots’ communication. Artificial neuro-glial networks is proposed to be combined in the swarm-based communication algorithm to provide a human-like model for the robot's communication and optimization.…”
Get full text
Get full text
Monograph -
18
March-based SRAM diagnostic algorithm for distinguishing stuck-at and transition faults
Published 2009“…March tests have been widely used for detecting functional faults during SRAM testing. …”
Get full text
Get full text
Article -
19
A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network
Published 2024“…Conclusion: The proposed algorithm that utilized NMM is more functional to enhance the precision of localization because of particular characteristics that are the flexible implementation of NMM and the free cost of using the RSSI technique.…”
Get full text
Get full text
Get full text
Get full text
Article -
20
Energy-efficient communications in wireless powered cognitive radio networks based on game theory / Fadhil Mukhlif Aswad Al-Obaidy
Published 2020“…In order to prove the effectiveness of such algorithms, numerical solutions are used in comparison with current power control algorithms. …”
Get full text
Get full text
Get full text
Thesis
