Search Results - (( using simulation method algorithm ) OR ( user evaluation method algorithm ))
Search alternatives:
- simulation method »
- evaluation method »
- method algorithm »
- user evaluation »
-
1
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…Conventionally, the numerical simulations for such devices are obtained by using the commercial simulation packages based on the Finite Element Methods (FEM). …”
Get full text
Get full text
Thesis -
2
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
Get full text
Get full text
Article -
3
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
4
PID TUNING OF DC MOTOR USING SWARM ITELLIGENCE ALGORITHM
Published 2012“…The simulation is performed both in C++ and MATLAB. PSO-PID Controller algorithm is performed in C++. …”
Get full text
Get full text
Final Year Project -
5
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
6
Detection of multiple outliners in linear regression using nonparametric methods
Published 2004“…Generally, method proposed by Sebert et al. (1998) is based on the use of single linkage clustering algorithm with the Euclidean distances to cluster the points in the plots of standard predicted versus residuals values from a linear regression model. …”
Get full text
Get full text
Monograph -
7
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…The dataset development for both algorithms is carried out via simulations in Graphical Network Simulator 3 (GNS3). …”
text::Thesis -
8
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Fingerprint is a reliable user authentication method as it is unique to individual users that makes it efficient for authenticating users. …”
Get full text
Get full text
Get full text
Article -
9
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To address these issues, a substantial amount of work has been done to determine optimal methods to improve QoS using task scheduling algorithms. …”
Get full text
Get full text
Get full text
Article -
10
Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony
Published 2022“…In this project, a comparative evaluation of selected algorithms is done to ascertain their applicability, practicality, and adaptability in a cloud scenario. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam
Published 2017“…Next, four recently introduced optimization algorithms are employed as feature selector, namely as 1) angle modulated simulated Kalman filter (AMSKF), 2) binary simulated Kalman filter (BSKF), 3) local optimum distance evaluated simulated Kalman filter (LocalDESKF), and 4) global optimum distance evaluated simulated Kalman filter (GlobalDESKF). …”
Get full text
Get full text
Get full text
Thesis -
12
Block based low complexity iterative QR precoder structure for Massive MIMO
Published 2021“…The simulation of quasi-static is used. We generate the model and evaluate the performance in MATLAB. …”
Get full text
Get full text
Thesis -
13
Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm
Published 2019“…However, SURE-Autometrics has not been estimated using maximum likelihood estimation (MLE). Therefore, in this study SUREAutometrics is improvised using two MLE methods, which are iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm, named as SURE(IFGLS)-Autometrics and SURE(EM)-Autometrics algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Channel-aware downlink scheduling for quality of service in long term evolution network
Published 2018“…The proposed algorithm using system-level simulation experiments with performance comparison with DBWPF in terms of end-to-end delay, fairness, system throughput, Packet Loss Ratio (PLR), and spectral efficiency was evaluated. …”
Get full text
Get full text
Get full text
Thesis -
15
Analysis of WiMAX Positioning Using Received- Signal-Strength Method
Published 2013“…By the performance evaluation, the user can plan better simulation system and can create more accurate algorithms for radio positioning.…”
Get full text
Get full text
Get full text
Article -
16
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…The system generates and evaluates potential schedules using fitness functions, selection, crossover, and mutation operators to iteratively improve scheduling efficiency. …”
Get full text
Get full text
Thesis -
17
Performance Comparison of Nature-inspired Optimization Algorithms Applied to MVDR Technique for Canceling Multiple Access Interference Signals
Published 2018“…Heuristic optimization algorithms are broadly used to solve many engineering problems. …”
Get full text
Get full text
Get full text
Article -
18
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian
Published 2009“…Simulation model is developed and done using Matlab® in analyzing and comparing the performance of conventional handoff with L-SH. …”
Get full text
Get full text
Research Reports -
20
Downlink capacity improvement of WCDMA system by using adaptive antenna with novel MDPC beamforming technique
Published 2023“…User mobility is taken into account to provide a combined evaluation of Radio Resource Management (RRM). …”
Conference paper
