Search Results - (( using simulation method algorithm ) OR ( software mitigation method algorithm ))

Refine Results
  1. 1
  2. 2

    Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems by Sabira, Khatun, Ali K., Marzook, Alyani, Ismail, Aduwati, Sali, Mohannad Hamed, Khalaf, Borhan, M. Ali

    Published 2012
    “…The adopted reduced rank technique is based on singular value decomposition algorithm. Equations for reduced rank-joint channel estimation (JCE) are derived and compared against traditional full rank-joint channel estimators: least square (LS) or Steiner, enhanced LS, and minimum mean square error algorithms. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Optimal Maintenance Scheduling for Multi-Component E-Manufacturing System by Arab, Ali

    Published 2009
    “…Furthermore, it indicates that when the mean time to repairs are longer, this method is more efficient. The results in the simulated testbed indicate that the developed scheduling method using simulation optimization functions properly and can be applied in other cases.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region by Fanos, Ali Mutar

    Published 2016
    “…In this study, rockfall source areas were identified using multi-criteria method based on DEM derivates, terrain type or land use/cover (LULC) and high spatial resolution aerial photo (13cm). …”
    Get full text
    Get full text
    Thesis
  6. 6

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…It allows one single instance of software to serve various clients. Password-based authentication is considered the cheapest and most popular and commonly used methods of computer authentication. …”
    text::Thesis
  7. 7

    VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS by WAGAN, ASIF ALI

    Published 2012
    “…In this study, the proposed framework methods are simulated using two propagation models, i.e. two ray ground model and Nakagami model for VANET environment (802.11p). …”
    Get full text
    Get full text
    Thesis
  8. 8

    VHF adaptive antenna using a rear defogger by Abdullah, Noorsaliza

    Published 2012
    “…Downhill simplex method is used as an algorithm to form the adaptive beam for the proposed antenna. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Effect of mesh coarseness on slope stability analysis using 2D and 3D finite element method by Noraida Mohd Saim, Anuar Kasa

    Published 2024
    “…However, the stability analyses using Finite Element Method (FEM) have gained significant attention in geotechnical engineering due to their ability to simulate slope behaviour and predict stability accurately by employing mathematical models and computational algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…Thirdly, a software simulation for SAC OCDMA system with the RD families using a commercial optical system, “OtisystemTM Ver. 7.0” is conducted. …”
    Get full text
    Thesis
  14. 14

    Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System by Al_Fugara, A’kif Mohammed Salem

    Published 2008
    “…From the results revealed by the MIKE11 modeling simulation, there were evidences that SMART was useful for flood mitigation of Klang River Basin. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu by Abdul Mannan, Dadu

    Published 2018
    “…The CMV can be bounded within one-fourth of the dc-link voltage of a three-phase four-leg inverter using the proposed NSV-MPC technique. MATLAB/Simulink software environment is used for the simulation and the LabVIEW Field programmable gate array (FPGA) rapid prototyping controller is used to validate the proposed control scheme. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    1D Multigrid Solver For Finite Element Method by Azhar, Mohamad Amiruddin

    Published 2022
    “…The new algorithm also has been tested using time simulation. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Efficient Sequential and Parallel Routing Algorithms in Optical Multistage Interconnection Network by Abduh Kaid, Monir Abdullah

    Published 2005
    “…This routing problem is an NPhard problem. Many algorithms are designed by many researchers to perform this routing such as window method, sequential algorithm, degree-descending algorithm, simulated annealing algorithm, genetic algorithm and ant colony algorithm.This thesis explores two approaches, sequential and parallel approaches. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Simulation Of Path Optimisation Algorithms by Sim, Choon Yeee

    Published 2017
    “…Likewise, when comparing between Bidirectional Searching with Replanning and Unidirectional Searching with Replanning, a decrease of 41.08%, 25.57% and 14.41% on algorithm total time can be seen. Thus, in this final year project, the optimum algorithm to use is A* algorithm with Bidirectional Searching method and Replanning method included during the searching process. …”
    Get full text
    Get full text
    Monograph
  19. 19

    The use of a partially simulated exothermic reactor to test nonlinear algorithms by Hussain, Mohd Azlan, Kittisupakorn, Paisan, Kershenbaum, L.

    Published 2000
    “…These methods have been found to be useful in dealing with difficult-to-control nonlinear systems, especially in simulated systems. …”
    Get full text
    Get full text
    Article
  20. 20

    Power Delivery Network Modeling And Simulation By Using Delaunay-Voronoi Triangulation And The Latency Insertion Method by Chin, Wei Chun

    Published 2018
    “…The research is focused into the analysis of PDN by modeling and simulation of the power plane. In the project, power plane is modeled using Delaunay-Voronoi algorithm and for simulation, a fast transient simulation algorithm which is latency insertion method (LIM) is applied. …”
    Get full text
    Get full text
    Monograph