Search Results - (( using optimization method algorithm ) OR ( using modification protocol algorithm ))
Search alternatives:
- using modification »
- protocol algorithm »
- method algorithm »
-
1
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…This thesis proposes some techniques to enhance the AMTree protocol. First we propose two algorithms to improve the handoff process in AMTree protocol. …”
Get full text
Get full text
Thesis -
2
-
3
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
4
The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2010“…In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the New-AIMD algorithm to measure the queue length and end-to-end delays and we will use the NCTUns simulator to get the results after make the modification of the mechanism. …”
Get full text
Get full text
Article -
5
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
6
A hybrid residue based sequential encoding mechanism with XGBoost improved ensemble model for identifying 5-hydroxymethylcytosine modifications
Published 2025“…Among the applied machine learning algorithms, the XGBoost ensemble model using the tenfold cross-validation test achieved improved results than existing state-of-the-art models. …”
Article -
7
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014“…The implementation consider the unfairness problem for the per flow throughput in IEEE 802.11 without the modification of the MAC protocol. We simulate the enhanced packet queuing algorithm using OMNET++. …”
Get full text
Get full text
Article -
8
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014“…The implementation consider the unfairness problem for the per flow throughput in IEEE 802.11 without the modification of the MAC protocol. We simulate the enhanced packet queuing algorithm using OMNET++. …”
Get full text
Get full text
Conference or Workshop Item -
9
Vehicular ad-hoc network (vanets) for electrical vehicle charging management
Published 2025text::Thesis -
10
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003“…Our design objective is to re-establish the communication traffic flow quickly and to minimize the service disruption delay that occnrs during handover process in a macro mobility environment. This handover algorithm is based on the modification of the HMIPv6 protocol using the multicast technique concept. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
12
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
13
Efficiency and fairness of new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2011“…The NCTUns simulator is used to obtain the results after implementing the modifications to the mechanism.…”
Get full text
Get full text
Get full text
Article -
14
A new routing metric for DYMO protocol on mobile AD HOC network
Published 2013“…To overcome this problem, several important modifications to the routing protocol algorithms are then considered to operate better in networks. …”
Get full text
Get full text
Get full text
Thesis -
15
On the delay and link utilization with the new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2010“…We want to evaluate the effect of using the AIMD algorithm after developing it, which we called the New-AIMD algorithm, to find a new approach to measure the end-to-end delay and bottleneck link utilization and use the NCTUns simulator to obtain the results after making the modification for the mechanism. …”
Get full text
Get full text
Get full text
Article -
16
Wind farm reactive power optimization by using imperialist competitive algorithm
Published 2013“…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
Get full text
Get full text
Conference or Workshop Item -
17
SA-EVPS ALGORITHM FOR DISCRETE SIZE OPTIMIZATION OF THE 582-BAR SPATIAL TRUSS STRUCTURE
Published 2023“…Nowadays, approximate optimization methods are widely used. This study utilized the Self Adaptive Enhanced Vibrating Particle System (SA-EVPS) algorithm as an approximate optimization method, since the EVPS algorithm requires experimental parameters. …”
Get full text
Get full text
Article -
18
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…Two methods of optimization are used for CBLL. They are Cross Entropy and also Genetic Algorithm. …”
Get full text
Get full text
Thesis -
19
Wind Farm Reactive Power Optimization by Using Imperialist Competitive Algorithm
Published 2013“…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz
Published 2016“…Therefore, optimization methods are often used in the sizing algorithms for such systems. …”
Get full text
Get full text
Thesis
