Search Results - (( using communication using algorithm ) OR ( using function based algorithm ))

Refine Results
  1. 1

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Investigation of gateway placement optimization approaches in wireless mesh networks using genetic algorithms by M. Ahmed, Awadallah, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina

    Published 2014
    “…The investigation result shows that the genetic algorithms based approaches on solving gateway optimization problem relatively outperform many other approaches in addition to that the strength of the genetic algorithm depends on the fitness function which is used in measuring the quality of the individuals (fitness value).…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Performance analysis of clustering based genetic algorithm by Najeeb, Athaur Rahman, Aibinu, Abiodun Musa, Nwohu, M. N., Salami, Momoh Jimoh Eyiomika, Salau, H Bello

    Published 2016
    “…The proposed CGA on which the performance analysis of this paper is based involve the use of two centroids based clustering technique as a new method of chromosomes selection at the reproduction stage in a typical Genetic Algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Comparison analysis of stream cipher algorithms for digital communication by Mat Sidek, Abd. Rahim, Sha'ameri, Ahmad Zuri

    Published 2007
    “…By using a common key length and worst case conditions, the strength of several stream cipher algorithms are evaluated using statistical tests, correlation attack, linear complexity profile and nonstandard test. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Review of Multi-Objective Swarm Intelligence Optimization Algorithms by Yasear, Shaymah Akram, Ku Mahamud, Ku Ruhana

    Published 2021
    “…The review is based on how the algorithms deal with objective functions using MOO approaches, the benchmark MOPs used in the evaluation and performance metrics. …”
    Get full text
    Get full text
    Article
  11. 11

    Perceptual speech enhancement exploiting temporal masking properties of human auditory system by Gunawan, Teddy Surya, Ambikairajah, Eliathamby, Epps, Julien

    Published 2010
    “…Objective evaluation using PESQ revealed that using the proposed forward masking model, the speech enhancement algorithm outperforms the other algorithms by 6–20% depending on the SNR. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Hybrid Improved Bacterial Swarm Optimization Algorithm for Hand-Based Multimodal Biometric Authentication System by Shanmugasundaram, Karthikeyan, Mohmed, Ahmad Sufril Azlan, Ruhaiyem, Nur Intan Raihana

    Published 2019
    “…In the proposed HIBS algorithm, the slow convergence of BFO algorithm was mitigated by using the random walk procedure of Firefly algorithm as an adaptive varying step size instead of using fixed step size. …”
    Get full text
    Get full text
    Article
  13. 13

    Embedded Ethernet System For Real-Time Communication by Thiagarajan, Durgesh

    Published 2018
    “…The Ethernet network model is used to analyze the performance of the backoff algorithm in a different number of nodes. …”
    Get full text
    Get full text
    Monograph
  14. 14

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Searching Malay text using stemming algorithm by Saian, Rizauddin, Ku-Mahamud, Ku Ruhana

    Published 2004
    “…The retrieved web pages are weighted and ranked using inverse document frequency function. The retrieval effectiveness is measured using standard recall and precision. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    PAPR Reduction Using Genetic Algorithm (GA) In OFDM System by Mohd Ramdan, Fatin Najwa Nursyadza

    Published 2018
    “…In this thesis, a Genetic algorithm (GA) technique is proposed. GA is a type of optimization algorithm, which is natural-based selection and is used to find the optimal solution to the computational problem that maximizes or minimizes a particular function. …”
    Get full text
    Get full text
    Monograph
  17. 17

    A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots by Ismail, Amelia Ritahani, Tumian, Afidalina

    Published 2019
    “…Therefore this research proposed a novel model for artificial neuro-glial networks and swarm-inspired algorithm for autonomous robots’ communication. Artificial neuro-glial networks is proposed to be combined in the swarm-based communication algorithm to provide a human-like model for the robot's communication and optimization.…”
    Get full text
    Get full text
    Monograph
  18. 18

    March-based SRAM diagnostic algorithm for distinguishing stuck-at and transition faults by Mihai, Masnita, Wan Hassan, Wan Zuha, Sidek, Roslina, Abdul Halin, Izhal

    Published 2009
    “…March tests have been widely used for detecting functional faults during SRAM testing. …”
    Get full text
    Get full text
    Article
  19. 19

    A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network by Gumaida, Bassam, Abubakar, Adamu

    Published 2024
    “…Conclusion: The proposed algorithm that utilized NMM is more functional to enhance the precision of localization because of particular characteristics that are the flexible implementation of NMM and the free cost of using the RSSI technique.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Energy-efficient communications in wireless powered cognitive radio networks based on game theory / Fadhil Mukhlif Aswad Al-Obaidy by Fadhil Mukhlif , Aswad Al-Obaidy

    Published 2020
    “…In order to prove the effectiveness of such algorithms, numerical solutions are used in comparison with current power control algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis