Search Results - (( using function method algorithm ) OR ( using communication based algorithm ))
Search alternatives:
- using communication »
- communication based »
- method algorithm »
- function method »
- using function »
-
1
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…Next, the Dynamic Demand Replacement Algorithm (DDRA) algorithm is used to place in-demand functions near the edge nodes periodically, while the proposed task scheduling algorithm - Maximum Revenue Bid (MRB) is used to give priority to tasks to maximise revenue near the edge. …”
Get full text
Get full text
Get full text
Article -
2
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis -
3
Performance analysis of clustering based genetic algorithm
Published 2016“…The proposed CGA on which the performance analysis of this paper is based involve the use of two centroids based clustering technique as a new method of chromosomes selection at the reproduction stage in a typical Genetic Algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network
Published 2024“…Methods: It is suggested that the objective function that will be optimized using NMM is the mean squared error of the range of all neighboring anchor nodes installed in the studied WSNs. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Two encryption functions in PHP has been used for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Perceptual speech enhancement exploiting temporal masking properties of human auditory system
Published 2010“…Objective evaluation using PESQ revealed that using the proposed forward masking model, the speech enhancement algorithm outperforms the other algorithms by 6–20% depending on the SNR. …”
Get full text
Get full text
Get full text
Article -
7
PAPR Reduction Using Genetic Algorithm (GA) In OFDM System
Published 2018“…In this thesis, a Genetic algorithm (GA) technique is proposed. GA is a type of optimization algorithm, which is natural-based selection and is used to find the optimal solution to the computational problem that maximizes or minimizes a particular function. …”
Get full text
Get full text
Monograph -
8
The compact genetic algorithm for likelihood estimator of first order moving average model
Published 2012“…Recently Genetic Algorithms (GAs) have frequently been used for optimizing the solution of estimation problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Reduced complexity optimum detector for block data transmission systems
Published 2010Get full text
Article -
10
Genetic algorithm techniques for the design of nonlinear microwave circuits
Published 2004“…In this report a hybrid method of Sample Balance Genetic Algorithm (SBGA) used to analyze nonlinear diode excited by RF circuit. …”
Get full text
Get full text
Get full text
Thesis -
11
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
Get full text
Get full text
Get full text
Article -
12
Vertical handover decision schemes in fourth generation heterogeneous cellular networks: A comprehensive study
Published 2018“…RSS based algorithms, bandwidth based algorithms, cost function based algorithms, and the combination algorithms. …”
Get full text
Get full text
Get full text
Article -
13
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
15
Differential Evolution Based Special Protection and Control Scheme for Contingency Monitoring of Transmission Line Overloading
Published 2017“…IEEE 30-bus test system was used to verify the effectiveness of the implemented methods.…”
Get full text
Get full text
Get full text
Book Section -
16
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method
Published 2010“…We introduce a modified cluster based model by using special nodes called server nodes (SN) that is powerful in term of resources. …”
Get full text
Get full text
Citation Index Journal -
17
-
18
High performance visualization of human tumor growth software
Published 2008“…The result of finite difference approximation (explicit, Crank-Nicolson and fully implicit methods) will be presented graphically. The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
High performance simulation for brain tumors growth using parabolic equation on heterogeneous parallel computer systems
Published 2007“…The implementation of parallel algorithm based on parallel computing system is used to capture the growth of brain tumour. …”
Get full text
Get full text
Article -
20
Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm
Published 2025“…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
Get full text
Get full text
Get full text
Article
