Search Results - (( using function method algorithm ) OR ( using communication using algorithm ))

Refine Results
  1. 1

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…Next, the Dynamic Demand Replacement Algorithm (DDRA) algorithm is used to place in-demand functions near the edge nodes periodically, while the proposed task scheduling algorithm - Maximum Revenue Bid (MRB) is used to give priority to tasks to maximise revenue near the edge. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…In a conclusion, SEM prototype and adaptive communication data transfer algorithm with a combination of the three communication will be another method to solve a single communication problem of SM and suitable in residential location that offered the proposed communication infrastructure.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Development of low power viterbi decoder on complex programmable logic device platform by Abu, Mohd Azlan

    Published 2018
    “…This especially has been used in a noisy digital communication system such as wireless communication. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    PAPR Reduction Using Genetic Algorithm (GA) In OFDM System by Mohd Ramdan, Fatin Najwa Nursyadza

    Published 2018
    “…In this thesis, a Genetic algorithm (GA) technique is proposed. GA is a type of optimization algorithm, which is natural-based selection and is used to find the optimal solution to the computational problem that maximizes or minimizes a particular function. …”
    Get full text
    Get full text
    Monograph
  6. 6

    A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network by Gumaida, Bassam, Abubakar, Adamu

    Published 2024
    “…Methods: It is suggested that the objective function that will be optimized using NMM is the mean squared error of the range of all neighboring anchor nodes installed in the studied WSNs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Perceptual speech enhancement exploiting temporal masking properties of human auditory system by Gunawan, Teddy Surya, Ambikairajah, Eliathamby, Epps, Julien

    Published 2010
    “…Objective evaluation using PESQ revealed that using the proposed forward masking model, the speech enhancement algorithm outperforms the other algorithms by 6–20% depending on the SNR. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Performance analysis of clustering based genetic algorithm by Najeeb, Athaur Rahman, Aibinu, Abiodun Musa, Nwohu, M. N., Salami, Momoh Jimoh Eyiomika, Salau, H Bello

    Published 2016
    “…The proposed CGA on which the performance analysis of this paper is based involve the use of two centroids based clustering technique as a new method of chromosomes selection at the reproduction stage in a typical Genetic Algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    The compact genetic algorithm for likelihood estimator of first order moving average model by Al-Dabbagh, R.D., Baba, M.S., Mekhilef, Saad, Kinsheel, A.

    Published 2012
    “…Recently Genetic Algorithms (GAs) have frequently been used for optimizing the solution of estimation problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Two encryption functions in PHP has been used for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    A Non‑cooperative Uplink Power Control for CDMA Wireless Communication System by Ali Farzamnia, Eng Soo Yew, Ervin Gubin Moung

    Published 2020
    “…Therefore, enhanced Nash algorithm (ENA) is proposed which only applicable in frst iteration of power control method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Genetic algorithm techniques for the design of nonlinear microwave circuits by Arsat, Rashidah

    Published 2004
    “…In this report a hybrid method of Sample Balance Genetic Algorithm (SBGA) used to analyze nonlinear diode excited by RF circuit. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The only way to read the messages is to know the method and the algorithm used in this project, which only the sender and the receiver will have the special key. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Design optimization for mass sizing of LEO communication satellites / Luqman Fathurrohim...[et al.] by Fathurrohim,, Luqman, Ridanto, Eko Poetro, Fariz, Ahmad

    Published 2018
    “…The results show that the optimization process using a genetic algorithm is successfully applied in solving complex multidisciplinary design problems such as the design of a communication satellite system with acceptable error.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Application of correlation as a measure of performance by Mohd. Rijal, O., Mohd Noor, N., Chang, Y.F.

    Published 2011
    “…In this study the correlation measure Rp 2 derived from the Un replicated Linear Functional relationship (ULFR) model will be shown to be a useful measure of performance in selected procedure or algorithm for a particular image registration method, a medical treatment, a character recognition method, and a compression method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems by Talebpour, Faraz

    Published 2016
    “…Adaptive algorithms used to estimate the QM’s imperfections, operate either in online or offline mode. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A New Technique To Design Coating Structure For Energy Saving Glass Using The Genetic Algorithm by Azmin, Farah Ayuni

    Published 2017
    “…After modifying these shapes using the Genetic algorithm and Parallel Genetic algorithm, the outputs are simulated in the Computer Simulation Technology (CST) simulation software. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Single channel speech enhancement using Wiener filter and compressive sensing by Sulong, Amart, Gunawan, Teddy Surya, Khalifa, Othman Omran, Kartiwi, Mira, Dao, Hassan

    Published 2017
    “…The speech enhancement algorithms are utilized to overcome multiple limitation factors in recent applications such as mobile phone and communication channel. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article