Search Results - (( using modification protocol algorithm ) OR ( evolution optimization bat algorithm ))

Refine Results
  1. 1

    Multi-Swarm bat algorithm by Taha A.M., Chen S.-D., Mustapha A.

    Published 2023
    “…In this study a new Bat Algorithm (BA) based on multi-swarm technique called the Multi-Swarm Bat Algorithm (MSBA) is proposed to address the problem of premature convergence phenomenon. …”
    Article
  2. 2
  3. 3

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…This thesis proposes some techniques to enhance the AMTree protocol. First we propose two algorithms to improve the handoff process in AMTree protocol. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…Basically, the QEEA is based on the Time Domain (TD) and Frequency Domain (FD) scheduling where it is dependent on the QoS requirements to allocate resources. The proposed algorithm is compared against other scheduling algorithms, namely, the Channel and QoS Aware (CQA), Priority Set Scheduler (PSS), Proportional Fair (PF), Maximum Throughput (MT) and Blind Average Throughput (BAT). …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm. by Jasem, Hayder Natiq, Ahmad Zukarnain, Zuriati, Mohamed, Othman, Subramaniam, Shamala

    Published 2010
    “…In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the New-AIMD algorithm to measure the queue length and end-to-end delays and we will use the NCTUns simulator to get the results after make the modification of the mechanism. …”
    Get full text
    Get full text
    Article
  7. 7

    A hybrid residue based sequential encoding mechanism with XGBoost improved ensemble model for identifying 5-hydroxymethylcytosine modifications by Uddin I., Awan H.H., Khalid M., Khan S., Akbar S., Sarker M.R., Abdolrasol M.G.M., Alghamdi T.A.H.

    Published 2025
    “…Among the applied machine learning algorithms, the XGBoost ensemble model using the tenfold cross-validation test achieved improved results than existing state-of-the-art models. …”
    Article
  8. 8

    Performance Comparison of Packet Queuing Algorithm in Wireless Networks by Nor Aida, Mahiddin, Raja Hasyifah, Raja Bongsu, Wan Nor Shuhadah, Wan Nik

    Published 2014
    “…The implementation consider the unfairness problem for the per flow throughput in IEEE 802.11 without the modification of the MAC protocol. We simulate the enhanced packet queuing algorithm using OMNET++. …”
    Get full text
    Get full text
    Article
  9. 9

    Performance Comparison of Packet Queuing Algorithm in Wireless Networks by Nor Aida, Mahiddin, Raja Hasyifah, Raja Bongsu, Wan Nor Shuhadah, Wan Nik

    Published 2014
    “…The implementation consider the unfairness problem for the per flow throughput in IEEE 802.11 without the modification of the MAC protocol. We simulate the enhanced packet queuing algorithm using OMNET++. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management by Vivaldi, Indra, Habaebi, Mohamed Hadi, Mohd Ali, Borhanuddin, V., Prakash

    Published 2003
    “…Our design objective is to re-establish the communication traffic flow quickly and to minimize the service disruption delay that occnrs during handover process in a macro mobility environment. This handover algorithm is based on the modification of the HMIPv6 protocol using the multicast technique concept. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13

    A new routing metric for DYMO protocol on mobile AD HOC network by Salleh, Noor Amani

    Published 2013
    “…To overcome this problem, several important modifications to the routing protocol algorithms are then considered to operate better in networks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    On the delay and link utilization with the new-additive increase multiplicative decrease congestion avoidance and control algorithm by Jasem, Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, Subramaniam, Shamala

    Published 2010
    “…We want to evaluate the effect of using the AIMD algorithm after developing it, which we called the New-AIMD algorithm, to find a new approach to measure the end-to-end delay and bottleneck link utilization and use the NCTUns simulator to obtain the results after making the modification for the mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm. by Jasem , Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, Subramaniam, Shamala

    Published 2009
    “…Approach: In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the AIMD algorithm after developing it to find a new approach, as we called it the New-AIMD algorithm to measure the bottleneck link utilization and use the NCTUns simulator to get the results after make the modification of the mechanism. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Investigation of throughput and packet drop for Hata model on VANET using NCTUns simulation software for open area and suburban area / Rosmawani Samsudin by Samsudin, Rosmawani

    Published 2012
    “…The investigation was done from 5 to up 20 V ANET nodes. The algorithms considered are Ad-hoc On-demand Distance Vector (AODV) protocol. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects by Olanrewaju, Rashidah Funke, Islam, Thouhedul, Khalifa, Othman Omran, Fajingbesi, Fawwaz Eniola

    Published 2018
    “…A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detected.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20