Search Results - (( using function using algorithm ) OR ( loading communication based algorithm ))

Refine Results
  1. 1

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…The prototype has been tested on a laboratory scale for its functionality by measuring the electrical parameters using heating elements as the load, and its ability in transferring data through three communications and monitoring as well as communicating with the SEM from DIS. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Efficient back-off mechanism for multimedia support in IEEE 802.11E by Al-Nuaimi, Aws Ali Shakir

    Published 2012
    “…The main concept of the DFA-EDCA algorithm is to use exponential functions to tune the back-off parameters adaptively according to changes in network load and serve the time-bounded multimedia applications rapidly. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Priority-based divisible load scheduling using analytical hierarchy process by Ghanbari, Shamsollah, Othman, Mohamed, Abu Bakar, Mohd Rizam, Leong, Wah June

    Published 2015
    “…The traditional divisible load theory is based on the fact that, the communications and computations are obedient and do not cheat the algorithm. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Differential Evolution Based Special Protection and Control Scheme for Contingency Monitoring of Transmission Line Overloading by Othman, Mohammad Lutfi, Hadi, Mahmood Khalid, Abdul Wahab, Noor Izzri

    Published 2017
    “…Simulation results for various N − 1 contingency conditions within the considered power system under base case load are proposed and validated with those results from the Genetic Algorithm (GA). Minimum severity index has been undertaken as the objective function of this research work. …”
    Get full text
    Get full text
    Get full text
    Book Section
  7. 7

    Reliability-aware swarm based multi-objective optimization for controller placement in distributed SDN architecture by Ibrahim, Abeer A.Z., Hashim, Fazirulhisyam, Sali, Aduwati, Noordin, Nor K., Navaie, Keivan, Fadul, Saber M.E.

    Published 2023
    “…The effectiveness of our hybrid RDMCP-PSO was then evaluated using extensive experiments and compared with other baseline algorithms. …”
    Get full text
    Get full text
    Article
  8. 8

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…Extensive computations utilizing MATLAB 2018a on the Intel Core i7/Gen 10 processor and 16 GB of RAM are used to evaluate the algorithm efficacy. According to the blueprint of our heuristic method, the allocation and the optimum number of controllers under an effective decentralized policy could achieve higher efficiency. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Differential evolution based special protection and control scheme for contingency monitoring of transmission line overloading by Hadi, Mahmood Khalid, Othman, Mohammad Lutfi, Abdul Wahab, Noor Izzri

    Published 2017
    “…Simulation results for various N − 1 contingency conditions within the considered power system under base case load are proposed and validated with those results from the Genetic Algorithm (GA). Minimum severity index has been undertaken as the objective function of this research work. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Design and implementation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayawi by Hayawi, Mustafa Jabbar

    Published 2015
    “…Design and development an adaptive learning algorithm controller ALAC of position the actuators is presented in real time parallel manipulator based on artificial neural network ANN. …”
    Get full text
    Get full text
    Thesis
  12. 12

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
    Get full text
    Get full text
    Article
  13. 13

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…This algorithm computes the optimal results of objective functions in a scientific manner. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced by Ahmed-Abdulazeez, Mariam Ovayioza

    Published 2018
    “…The HHPO and the MC-HOD algorithms achieves significant enhancement compared to the conventional and other algorithms examined. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures by Koohi, Sina Zangbari

    Published 2020
    “…These steps have conducted using the MEMPHA model and ROA algorithm to optimize three metrics: execution time, total communication volume, and imbalance ratio (load balancing). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Green network planning and operational power consumption optimization in LTE-A using artificial intelligence by Al-Samawi, Aida Ismail Ahmed

    Published 2015
    “…The second stage of the developed algorithm optimizes the average number of relay station per base station and their distance from the respective base station to meet the capacity constraint of the network operator. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Quality of service performances of three mobile ad hoc network protocols by Adam, Nabilah

    Published 2009
    “…The protocols included the Dynamic Source Routing (DSR), Ad Hoc On-demand Distance Vector (AODV) and Temporally Ordered Routing Algorithm (TORA) protocol. The analysis had been done theoretically and through simulation using an Optimized Network Engineering Tools (OPNET) Modeler. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Multi-criteria based algorithm for scheduling divisible load by Ghanbari, Shamsollah, Othman, Mohamed, Leong, Wah June, Abu Bakar, Mohd Rizam

    Published 2013
    “…Existing divisible load scheduling algorithms do not consider any priority for allocating fraction of load. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Multi-criteria divisible load scheduling in binary tree network by Ghanbari, Shamsollah

    Published 2016
    “…The traditional divisible load scheduling assumes that the processors report their true computation and communication rates, i.e., they do not cheat the algorithm. …”
    Get full text
    Get full text
    Thesis