Academic literature on the topic 'Throughput Evaluation Algorithms'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Throughput Evaluation Algorithms.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Throughput Evaluation Algorithms"

1

Adebayo, Ademola Riliwan, Samuel Gbenga Oluokun, Rotimi Samuel Ogunode, and Osunade Seyi. "Performance Evaluation of Non-Latin Characters Based (Arabic) Symmetric Encryption Algorithm." Performance Evaluation of Non-Latin Characters Based (Arabic) Symmetric Encryption Algorithm 9, no. 1 (2024): 9. https://doi.org/10.5281/zenodo.10539171.

Full text
Abstract:
Cryptography is the art of keeping information secure by transforming it into form that unintended recipients cannot understand. Encryption is a form of data security in which information is converted to cipher text to ensure confidentiality, authentication and integrity of user data. Issue relating to the choice of encryption algorithm among the Arabian IT community is another challenge. This research evaluated the  performance of three symmetric non-Latin character- based encryption algorithms for Arabic text: First- Order-Equation-of-Three-Variables, Modulo-37-cipher,  and Atbash-
APA, Harvard, Vancouver, ISO, and other styles
2

Bt Ismail, Shafinaz, Darmawaty Bt Mohd Ali, and Norsuzila Ya’acob. "Performance Analysis of Uplink Scheduling Algorithms in LTE Networks." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 2 (2018): 373. http://dx.doi.org/10.11591/ijeecs.v9.i2.pp373-379.

Full text
Abstract:
Scheduling is referring to the process of allocating resources to User Equipment based on scheduling algorithms that is located at the LTE base station. Various algorithms have been proposed as the execution of scheduling algorithm, which represents an open issue in Long Term Evolution (LTE) standard. This paper makes an attempt to study and compare the performance of three well-known uplink schedulers namely, Maximum Throughput (MT), First Maximum Expansion (FME), and Round Robin (RR). The evaluation is considered for a single cell with interference for three flows such as Best effort, Video
APA, Harvard, Vancouver, ISO, and other styles
3

Shafinaz, Bt Ismail, Bt Mohd Ali Darmawaty, and Ya'acob Norsuzila. "Performance Analysis of Uplink Scheduling Algorithms in LTE Networks." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 2 (2018): 373–79. https://doi.org/10.11591/ijeecs.v9.i2.pp373-379.

Full text
Abstract:
Scheduling is referring to the process of allocating resources to User Equipment based on scheduling algorithms that is located at the LTE base station. Various algorithms have been proposed as the execution of scheduling algorithm, which represents an open issue in Long Term Evolution (LTE) standard. This paper makes an attempt to study and compare the performance of three well-known uplink schedulers namely, Maximum Throughput (MT), First Maximum Expansion (FME), and Round Robin (RR). The evaluation is considered for a single cell with interference for three flows such as Best effort, Video
APA, Harvard, Vancouver, ISO, and other styles
4

Mahdi, Hussain, Baidaa Al-Bander, Mohammed Hasan Alwan, Mohammed Salah Abood, and Mustafa Maad Hamdi. "Vehicular Networks Performance Evaluation Based on Downlink Scheduling Algorithms for High-Speed Long Term Evolution – Vehicle." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 21 (2021): 52. http://dx.doi.org/10.3991/ijim.v15i21.22475.

Full text
Abstract:
<p class="Abstract"><span lang="EN-US">Moving is the key to modern life. Most things are in moving such as vehicles and user mobiles, so the need for high-speed wireless networks to serve the high demand of the wireless application becomes essential for any wireless network design. The use of web browsing, online gaming, and on-time data exchange like video calls as an example means that users need a high data rate and fewer error communication links. To satisfy this, increasing the bandwidth available for each network will enhance the throughput of the communication, but the bandw
APA, Harvard, Vancouver, ISO, and other styles
5

Garg, Akanksha, Navdeep S.Sethi, Nidhi Arora, and Amit Makkar. "BNP TASK SCHEDULING ALGORITHMS FOR PERFORMANCE EVALUATION IN PARALLEL SYSTEM." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 8 (2014): 3768–77. http://dx.doi.org/10.24297/ijct.v12i8.3014.

Full text
Abstract:
Scheduling is the process to minimize the schedule length by proper allocation of the tasks to the processors and arrangement of execution sequencing of the tasks. Multiprocessor Scheduling using Directed Acyclic Graph (DAG) is used in this research. Â An important implication of minimization of schedule length is that the system throughput is maximized. The objective of this survey is to describe various scheduling algorithms and their functionalities in a contrasting fashion as well as examine their relative merits in terms of performance and time-complexity. In this research, three BNP Sche
APA, Harvard, Vancouver, ISO, and other styles
6

Kirat, Pal Singh, and Kumar Dilip. "Performance Evaluation of Low Power MIPS Crypto Processor based on Cryptography Algorithms." International Journal of Engineering Research and Applications 2, no. 3 (2012): 1625–34. https://doi.org/10.5281/zenodo.33251.

Full text
Abstract:
This paper presents the design and implementation of low power 32-bit encrypted and decrypted MIPS processor for Data Encryption Standard (DES), Triple DES, Advanced Encryption Standard (AES) based on MIPS pipeline architecture. The organization of pipeline stages has been done in such a way that pipeline can be clocked at high frequency. Encryption and Decryption blocks of three standard cryptography algorithms on MIPS processor and dependency among themselves are explained in detail with the help of a block diagram. Clock gating technique is used to reduce the power consumption in MIPS crypt
APA, Harvard, Vancouver, ISO, and other styles
7

Shrikant Upadhyay. "Machine Learning-Based Beamforming Algorithm for Massive MIMO Systems in 5G Networks." Journal of Electrical Systems 20, no. 3s (2024): 971–79. http://dx.doi.org/10.52783/jes.1411.

Full text
Abstract:
The following research focuses on the use of machine learning-based beamforming algorithms to improve Massive Multiple Input Multiple Output (MIMO) systems in 5G networks. Four unique algorithms namely, the Deep Learning Beamforming Algorithm (DLBA), Reinforcement Learning-Based Doa Estimation Algorithm (RLBEA), Clustering based beam forming algorithm(CBA) and GeneticAlgorithm Based Beam Forming Algoeithm were developed after which each of them was undertook evaluation. Widespread trials, in a simulated 5G environment, have revealed that the DLBA and RLBA considerably outperform other technolo
APA, Harvard, Vancouver, ISO, and other styles
8

Adane, Kibreab, Kedamo Mohammed, and Keyre Kemal. "Enhancing Cloud Computing Performance for Fast Online Services Delivery Using a Novel Hybrid Task Scheduling Algorithm." International Journal of Computer Information Systems and Industrial Management Applications 17 (May 29, 2025): 466–85. https://doi.org/10.70917/ijcisim-2025-0030.

Full text
Abstract:
Forwarding many tasks to the cloud server simultaneously degrades cloud computing performance in this regard, time-dependent sectors like banks, healthcare, airlines, online shopping, and more suffer from slow delivery of cloud computing services unless a suitable task scheduling technique is implemented. The existing literature-based evidence reveals that effective task scheduling in cloud computing optimizes resource usage, boosts fault tolerance, facilitates scalability, lowers costs, and reduces energy consumption. However, identifying task-scheduling algorithms that fulfill the stated ben
APA, Harvard, Vancouver, ISO, and other styles
9

ABIODUN, Ahmida, Olanrewaju LAWAL, Oyediran OYEBIYI, Odiete JOSEPH, and Adeyemi ADETORO. "Performance Evaluation of Selected Encryption Algorithms." International Journal of Information Security and Cybercrime 10, no. 2 (2021): 21–30. http://dx.doi.org/10.19107/ijisc.2021.02.03.

Full text
Abstract:
Data security is a key aspect of today’s communication trend and growth. Various mechanisms have been developed to achieve this security. One is cryptography, which represents a most effective method of enhancing security and confidentiality of data. In this work, a hybrid based 136bit key algorithm involving a sequential combination of XOR (Exclusive –Or) encryption and AES (Advanced Encryption Standard) algorithm to enhance the security strength is developed. The hybrid algorithm performance is matched with XOR encryption and AES algorithm using encryption and decryption time, throughput of
APA, Harvard, Vancouver, ISO, and other styles
10

Vanhatupa, Timo, Marko Hännikäinen, and Timo D. Hämäläinen. "Evaluation of throughput estimation models and algorithms for WLAN frequency planning." Computer Networks 51, no. 11 (2007): 3110–24. http://dx.doi.org/10.1016/j.comnet.2007.01.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Throughput Evaluation Algorithms"

1

Skone, Gwyn S. "Stratagems for effective function evaluation in computational chemistry." Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:8843465b-3e5f-45d9-a973-3b27949407ef.

Full text
Abstract:
In recent years, the potential benefits of high-throughput virtual screening to the drug discovery community have been recognized, bringing an increase in the number of tools developed for this purpose. These programs have to process large quantities of data, searching for an optimal solution in a vast combinatorial range. This is particularly the case for protein-ligand docking, since proteins are sophisticated structures with complicated interactions for which either molecule might reshape itself. Even the very limited flexibility model to be considered here, using ligand conformation ensemb
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmed, Toqeer. "Load balancing solution and evaluation of F5 content switch equipment." Thesis, Högskolan Dalarna, Datateknik, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:du-2356.

Full text
Abstract:
The Thesis focused on hardware based Load balancing solution of web traffic through a load balancer F5 content switch. In this project, the implemented scenario for distributing HTTPtraffic load is based on different CPU usages (processing speed) of multiple member servers.Two widely used load balancing algorithms Round Robin (RR) and Ratio model (weighted Round Robin) are implemented through F5 load balancer. For evaluating the performance of F5 content switch, some experimental tests has been taken on implemented scenarios using RR and Ratio model load balancing algorithms. The performance i
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Throughput Evaluation Algorithms"

1

Feld, Leonard G., and John D. Mahan. Succinct Pediatrics: Evaluation and Management of Infectious Diseases and Dermatology. American Academy of Pediatrics, 2016. http://dx.doi.org/10.1542/9781610020770.

Full text
Abstract:
Confidently evaluate evidence-based information to make timely and accurate diagnoses and treatment decisions! Continuing with this volume, Succinct Pediatrics will be an ongoing series covering the entire scope of pediatric medicine. Each volume will include short chapters with key features and invaluable tables and algorithms, allowing health care professionals the opportunity to deliver the highest quality of care. The second volume features 58 topics with key points and detailed therapies in Infectious Diseases and Dermatological Disorders. The book starts with an overview of the core know
APA, Harvard, Vancouver, ISO, and other styles
2

Feld, Leonard G., and John D. Mahan. Succinct Pediatrics: Evaluation and Management for Newborn, Genetic, Neurologic, and Developmental-Behavioral Disorders. American Academy of Pediatrics, 2017. http://dx.doi.org/10.1542/9781610021258.

Full text
Abstract:
Obtain evidence-based information to make timely and accurate diagnoses and treatment decisions. Continuing with this volume, Succinct Pediatrics is an ongoing series covering the entire scope of pediatric medicine. Each volume includes concise chapters with key features and invaluable tables and algorithms--resources health care professionals can use to deliver the highest quality of care. This third volume features 41 topics with key points and detailed therapies in neonatology, genetics, neurology, and developmental and behavioral disorders. Evidence-based levels of decision support are als
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Throughput Evaluation Algorithms"

1

Tinhofer, Ingeborg. "Innovations in Cell-Based Assays for Drug Discovery and Evaluation." In Critical Issues in Head and Neck Oncology. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-84539-0_4.

Full text
Abstract:
Abstract The field of drug development has seen significant advancements in recent years, primarily driven by the development of advanced preclinical models. Traditional drug screening methods often lack the biological relevance necessary to predict clinical outcomes accurately. Novel cell-based assays have emerged as a powerful tool to bridge this gap. These assays comprise various cellular models, including spheroids, organoids, and organotypic co-culture systems, to better mimic complex in vivo environments and cellular interactions. This improved physiological relevance enhances the identi
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Chao. "Research on Dynamic Network Load Evaluation Algorithm Based on Throughput Monitoring." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36402-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Choumas, Kostas, Thanasis Korakis, Iordanis Koutsopoulos, and Leandros Tassiulas. "Implementation and End-to-end Throughput Evaluation of an IEEE 802.11 Compliant Version of the Enhanced-Backpressure Algorithm." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35576-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rachner, Jonas, Lea Kaven, Florian Voet, Amon Göppert, and Robert H. Schmitt. "Simulation-Based Potential Analysis of Line-Less Assembly Systems in the Automotive Industry." In Annals of Scientific Society for Assembly, Handling and Industrial Robotics 2022. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-10071-0_4.

Full text
Abstract:
AbstractIncreasing product variety, shorter product life cycles, and the ongoing transition towards electro-mobility demand higher flexibility in automotive production. Especially in the final assembly, where most variant-dependent processes are happening, the currently predominant concept of flowing line assembly is already been pushed to its flexibility limits. Line-less assembly systems break up the rigid line structures by enabling higher routing and operational flexibility using individual product routes that are takt-time independent. Hybrid approaches consider the combination of line an
APA, Harvard, Vancouver, ISO, and other styles
5

Sang, Aimin, Guosen Yue, Xiaodong Wang, and Mohammad Madihian. "Cross-Layer Performance of Scheduling and Power Control Schemes in Space-Time Block Coded Downlink Packet Systems." In Handbook on Advancements in Smart Antenna Technologies for Wireless Networks. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-988-5.ch018.

Full text
Abstract:
In this chapter, we consider a cellular downlink packet data system employing the space-time block coded (STBC) multiple- input-multiple-output (MIMO) scheme. Taking the CDMA high data rate (HDR) system for example, we evaluate the cross-layer performance of typical scheduling algorithms and a point-to-point power control scheme over a time division multiplexing (TDM)-based shared MIMO channel. Our evaluation focuses on the role of those schemes in multi-user diversity gain, and their impacts on medium access control (MAC) and physical layer performance metrics for delay-tolerant data services
APA, Harvard, Vancouver, ISO, and other styles
6

Hemamalini, V., Amit Kumar Tyagi, V. Vennila, and Shabnam Kumari. "Revolutionizing drug Discovery With Cutting-Edge Technologies." In Converging Pharmacy Science and Engineering in Computational Drug Discovery. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-2897-2.ch004.

Full text
Abstract:
This chapter discusses the transformative potential of cutting-edge technologies in revolutionizing drug discovery processes, highlighting key issues and challenges anticipated in the next decade. The integration of technologies such as artificial intelligence (AI), high-throughput screening, CRISPR/Cas9 gene editing, and advanced analytics is poised to reshape the landscape of pharmaceutical research, promising accelerated development timelines and enhanced therapeutic outcomes. Artificial intelligence, particularly machine learning algorithms, plays a central role in data analysis, target id
APA, Harvard, Vancouver, ISO, and other styles
7

Dansana, Debabrata, and Rakesh K. Kadu. "FPGA Implementations of Secure Cryptographic Algorithms for Embedded Systems." In Smart Microcontrollers and FPGA Based Architectures for Advanced Computing and Signal Processing, 2025th ed. RADemics Research Institute, 2025. https://doi.org/10.71443/9789349552425-11.

Full text
Abstract:
The escalating demand for secure communication in embedded systems, particularly in the context of the Internet of Things (IoT), necessitates cryptographic implementations that are both efficient and resilient. Field-Programmable Gate Arrays (FPGAs) have emerged as an ideal platform for deploying lightweight cryptographic algorithms due to their reconfigurability, parallelism, and suitability for low-power designs. This chapter presents a comprehensive exploration of FPGA-based implementations of secure cryptographic primitives tailored for embedded applications. Emphasis is placed on the desi
APA, Harvard, Vancouver, ISO, and other styles
8

Tchagang, Alain B., Youlian Pan, Fazel Famili, Ahmed H. Tewfik, and Panayiotis V. Benos. "Biclustering of DNA Microarray Data." In Handbook of Research on Computational and Systems Biology. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-491-2.ch007.

Full text
Abstract:
In this chapter, different methods and applications of biclustering algorithms to DNA microarray data analysis that have been developed in recent years are discussed and compared. Identification of biological significant clusters of genes from microarray experimental data is a very daunting task that emerged, especially with the development of high throughput technologies. Various computational and evaluation methods based on diverse principles were introduced to identify new similarities among genes. Mathematical aspects of the models are highlighted, and applications to solve biological prob
APA, Harvard, Vancouver, ISO, and other styles
9

Alhaj, Abdullah A. "Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)." In Cloud Technology. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6539-2.ch038.

Full text
Abstract:
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication. With the increasing demand for computer communications the need for security is growing dramatically. The existing research related to security mechanisms focuses on security of the data transmission in the communication networks only. The authors developed specific Secure Data Transmission Mechanism (S SDT
APA, Harvard, Vancouver, ISO, and other styles
10

Afrose, Naureen, Rideb Chakraborty, Ahana Hazra, Pratibha Bhowmick, and Mithun Bhowmick. "AI-Driven Drug Discovery and Development." In Future of AI in Biomedicine and Biotechnology. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-3629-8.ch013.

Full text
Abstract:
Artificial intelligence (AI) has revolutionized the discovery and development of new drugs in biomedicine. By using advanced algorithms and computational methods, AI optimizes treatment plans, accelerates the drug development process, and improves patient outcomes. AI algorithms integrate multi-omics data sets, decipher molecular connections, and identify therapeutic targets and biomarkers. High-throughput screening, predictive modeling, and AI-powered virtual screening platforms are revolutionizing the drug development pipeline. Machine learning and deep learning models enable drug-target int
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Throughput Evaluation Algorithms"

1

Tajima, Keito, Naoki Ichijo, Yuta Nakahara, Koshi Shimada, and Toshiyasu Mathushima. "An Algorithmic Framework for Constructing Multiple Decision Trees by Evaluating Their Combination Performance Throughout the Construction Process." In 2024 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2024. https://doi.org/10.1109/smc54092.2024.10830978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bershadsky, Dmitry, and Eric Johnson. "Benchmarking of UAV Guidance Systems in Nap of the Earth (NOE) Flight." In Vertical Flight Society 70th Annual Forum & Technology Display. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9672.

Full text
Abstract:
This paper describes the development of a proposed framework of metrics for the evaluation of the performance of aircraft guidance systems. The methodologies and metrics developed remain generally agnostic to whether or not the aircraft is manned. Although more complicated missions such as autonomous exploration/search, ferry, surveillance, multi-agent collaboration, and manned flight may be addressed at a later time, A-B flight scenarios are chosen to study the proposed metrics. The proposed metrics will form building blocks for the more complicated missions. Metrics development has thus far
APA, Harvard, Vancouver, ISO, and other styles
3

Peeters, G. T., and B. Van Houdt. "Improved High Maximum Stable Throughput FCFS Tree Algorithms with Interference Cancellation." In 3rd International ICST Conference on Performance Evaluation Methodologies and Tools. ICST, 2008. http://dx.doi.org/10.4108/icst.valuetools2008.4257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vanhatupa, Timo, Marko Hännikäinen, and Timo D. Hämäläinen. "Evaluation of throughput estimation models and algorithms for WLAN frequency planning." In the 3rd international conference. ACM Press, 2006. http://dx.doi.org/10.1145/1185373.1185431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bo, Chen, Hou Xiaolin, and Shichuan Ma. "Throughput Evaluation of Fixed Beams in a TD-SCDMA HSDPA System Using Different CQI Feedback Algorithms." In 2008 IEEE 68th Vehicular Technology Conference (VTC 2008-Fall). IEEE, 2008. http://dx.doi.org/10.1109/vetecf.2008.280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pellegrini, Joseph C., Ziad R. Hatab, Jeffrey M. Bush, and Thomas R. Glass. "Supersparse overlay sampling plans: an evaluation of methods and algorithms for optimizing overlay quality control and metrology tool throughput." In Microlithography '99, edited by Bhanwar Singh. SPIE, 1999. http://dx.doi.org/10.1117/12.350780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Almeida, Leandro C. de, Paulo Ditarso Maciel Jr., and Fábio L. Verdi. "Evaluating L4S Framework Performance with Programmable Data Plane Hardware." In Workshop de Gerência e Operação de Redes e Serviços. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/wgrs.2024.3286.

Full text
Abstract:
L4S, which stands for Low Latency, Low Loss, Scalable Throughput, is an initiative within the Internet Engineering Task Force (IETF) dedicated to enhancing the performance of real-time interactive applications across the Internet, like online gaming, video conferencing, and virtual reality. Its core principles revolve around implementing a novel variant of congestion control (CC) algorithm on end hosts and deploying an Active Queue Management (AQM) scheme on network nodes. Evaluating AQM algorithm adherence within the L4S framework on conventional network devices is challenging due to limited
APA, Harvard, Vancouver, ISO, and other styles
8

Luiz, Douglas Pereira, and Odorico Machado Mendizabal. "Lightweight Asynchronous Repartitioning for Local State Partitioned Systems." In Simpósio em Sistemas Computacionais de Alto Desempenho. Sociedade Brasileira de Computação, 2024. http://dx.doi.org/10.5753/sscad.2024.244785.

Full text
Abstract:
Partitioning strategies combined with rebalancing algorithms can be used to balance the load in high-throughput systems. Keeping the load balanced constantly is desirable, but the cost of repartitioning can be high. This work presents a rebalancing strategy based on balanced graph partitioning algorithms with low impact during rebalancing operations. The new technique allows for frequent partitioning updates by decoupling the repartitioning process from the rest of the system, thereby avoiding disruptions within the system due to the calculation of new partitioning schemas. In experimental eva
APA, Harvard, Vancouver, ISO, and other styles
9

Siciliano, Giulia, Yue Yu, and Johannes Fottner. "Synergy between Shuttles and Stacker Cranes in Dynamic Hybrid Pallet Warehouses: Control Strategies and Performance Evaluation." In 36th ECMS International Conference on Modelling and Simulation. ECMS, 2022. http://dx.doi.org/10.7148/2022-0143.

Full text
Abstract:
This article considers two dynamic hybrid pallet warehouses obtained hybridizing a shuttle-based warehouse with stacker cranes. We begin by describing their design and characteristics. Afterwards, we explain the control algorithms that were developed for them. Next, we illustrate the modalities of the discrete event simulation study we ran to investigate their performance. In conclusion, we discuss the results in terms of throughput of the simulation study to individuate the field of application for the two layouts of dynamic hybrid pallet warehouses in comparison to stacker crane-based and sh
APA, Harvard, Vancouver, ISO, and other styles
10

Oluwatope, Ayodeji, Biodun Obabire, G. Adesola Aderounmu, and Matthew Adigun. "End-to-End Performance Evaluation of Selected TCP Variants across a Hybrid Wireless Network." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/3022.

Full text
Abstract:
Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion. TCP is intended for use as a highly reliable end-to-end transport protocol for transporting applications such as World-Wide Web (WWW) between hosts in packet-switched computer communication networks. TCP was originally designed for wired links where the error rate is really low and actually assumed that packet losses are due to congestion in the network. However, the increasing popularity of wireless networks indicates that wireless links will play
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Throughput Evaluation Algorithms"

1

Sakulneya, Apidej, and Jeffery Roesler. Smart Construction Work-Zone Safety with V2I Passive Material Sensing. Illinois Center for Transportation, 2024. https://doi.org/10.36501/0197-9191/24-027.

Full text
Abstract:
This study explored new vehicle to infrastructure (V2I) technology in construction work zones (CWZ), where speeding, unsafe driving behaviors, and drivers' failure to obey traffic signs contribute significantly to elevated accident rates and fatalities. The objective of this research to advance CWZ safety by evaluating the potential of 3-axis magnetometers attached to a moving cart and traversing over a pavement-assisted passive sensing system can improve vehicle lateral positioning and warning in CWZ. Secondly, to develop a process to implement a programmable ferromagnetic oxide material for
APA, Harvard, Vancouver, ISO, and other styles
2

Gur, Amit, Edward Buckler, Joseph Burger, Yaakov Tadmor, and Iftach Klapp. Characterization of genetic variation and yield heterosis in Cucumis melo. United States Department of Agriculture, 2016. http://dx.doi.org/10.32747/2016.7600047.bard.

Full text
Abstract:
Project objectives: 1) Characterization of variation for yield heterosis in melon using Half-Diallele (HDA) design. 2) Development and implementation of image-based yield phenotyping in melon. 3) Characterization of genetic, epigenetic and transcriptional variation across 25 founder lines and selected hybrids. The epigentic part of this objective was modified during the course of the project: instead of characterization of chromatin structure in a single melon line through genome-wide mapping of nucleosomes using MNase-seq approach, we took advantage of rapid advancements in single-molecule se
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!