Academic literature on the topic 'Throughput Evaluation Algorithms'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Throughput Evaluation Algorithms.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Throughput Evaluation Algorithms"

1

Adebayo, Ademola Riliwan, Samuel Gbenga Oluokun, Rotimi Samuel Ogunode, and Osunade Seyi. "Performance Evaluation of Non-Latin Characters Based (Arabic) Symmetric Encryption Algorithm." Performance Evaluation of Non-Latin Characters Based (Arabic) Symmetric Encryption Algorithm 9, no. 1 (2024): 9. https://doi.org/10.5281/zenodo.10539171.

Full text
Abstract:
Cryptography is the art of keeping information secure by transforming it into form that unintended recipients cannot understand. Encryption is a form of data security in which information is converted to cipher text to ensure confidentiality, authentication and integrity of user data. Issue relating to the choice of encryption algorithm among the Arabian IT community is another challenge. This research evaluated the  performance of three symmetric non-Latin character- based encryption algorithms for Arabic text: First- Order-Equation-of-Three-Variables, Modulo-37-cipher,  and Atbash-
APA, Harvard, Vancouver, ISO, and other styles
2

Bt Ismail, Shafinaz, Darmawaty Bt Mohd Ali, and Norsuzila Ya’acob. "Performance Analysis of Uplink Scheduling Algorithms in LTE Networks." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 2 (2018): 373. http://dx.doi.org/10.11591/ijeecs.v9.i2.pp373-379.

Full text
Abstract:
Scheduling is referring to the process of allocating resources to User Equipment based on scheduling algorithms that is located at the LTE base station. Various algorithms have been proposed as the execution of scheduling algorithm, which represents an open issue in Long Term Evolution (LTE) standard. This paper makes an attempt to study and compare the performance of three well-known uplink schedulers namely, Maximum Throughput (MT), First Maximum Expansion (FME), and Round Robin (RR). The evaluation is considered for a single cell with interference for three flows such as Best effort, Video
APA, Harvard, Vancouver, ISO, and other styles
3

Shafinaz, Bt Ismail, Bt Mohd Ali Darmawaty, and Ya'acob Norsuzila. "Performance Analysis of Uplink Scheduling Algorithms in LTE Networks." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 2 (2018): 373–79. https://doi.org/10.11591/ijeecs.v9.i2.pp373-379.

Full text
Abstract:
Scheduling is referring to the process of allocating resources to User Equipment based on scheduling algorithms that is located at the LTE base station. Various algorithms have been proposed as the execution of scheduling algorithm, which represents an open issue in Long Term Evolution (LTE) standard. This paper makes an attempt to study and compare the performance of three well-known uplink schedulers namely, Maximum Throughput (MT), First Maximum Expansion (FME), and Round Robin (RR). The evaluation is considered for a single cell with interference for three flows such as Best effort, Video
APA, Harvard, Vancouver, ISO, and other styles
4

Mahdi, Hussain, Baidaa Al-Bander, Mohammed Hasan Alwan, Mohammed Salah Abood, and Mustafa Maad Hamdi. "Vehicular Networks Performance Evaluation Based on Downlink Scheduling Algorithms for High-Speed Long Term Evolution – Vehicle." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 21 (2021): 52. http://dx.doi.org/10.3991/ijim.v15i21.22475.

Full text
Abstract:
<p class="Abstract"><span lang="EN-US">Moving is the key to modern life. Most things are in moving such as vehicles and user mobiles, so the need for high-speed wireless networks to serve the high demand of the wireless application becomes essential for any wireless network design. The use of web browsing, online gaming, and on-time data exchange like video calls as an example means that users need a high data rate and fewer error communication links. To satisfy this, increasing the bandwidth available for each network will enhance the throughput of the communication, but the bandw
APA, Harvard, Vancouver, ISO, and other styles
5

Garg, Akanksha, Navdeep S.Sethi, Nidhi Arora, and Amit Makkar. "BNP TASK SCHEDULING ALGORITHMS FOR PERFORMANCE EVALUATION IN PARALLEL SYSTEM." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 8 (2014): 3768–77. http://dx.doi.org/10.24297/ijct.v12i8.3014.

Full text
Abstract:
Scheduling is the process to minimize the schedule length by proper allocation of the tasks to the processors and arrangement of execution sequencing of the tasks. Multiprocessor Scheduling using Directed Acyclic Graph (DAG) is used in this research. Â An important implication of minimization of schedule length is that the system throughput is maximized. The objective of this survey is to describe various scheduling algorithms and their functionalities in a contrasting fashion as well as examine their relative merits in terms of performance and time-complexity. In this research, three BNP Sche
APA, Harvard, Vancouver, ISO, and other styles
6

Kirat, Pal Singh, and Kumar Dilip. "Performance Evaluation of Low Power MIPS Crypto Processor based on Cryptography Algorithms." International Journal of Engineering Research and Applications 2, no. 3 (2012): 1625–34. https://doi.org/10.5281/zenodo.33251.

Full text
Abstract:
This paper presents the design and implementation of low power 32-bit encrypted and decrypted MIPS processor for Data Encryption Standard (DES), Triple DES, Advanced Encryption Standard (AES) based on MIPS pipeline architecture. The organization of pipeline stages has been done in such a way that pipeline can be clocked at high frequency. Encryption and Decryption blocks of three standard cryptography algorithms on MIPS processor and dependency among themselves are explained in detail with the help of a block diagram. Clock gating technique is used to reduce the power consumption in MIPS crypt
APA, Harvard, Vancouver, ISO, and other styles
7

Shrikant Upadhyay. "Machine Learning-Based Beamforming Algorithm for Massive MIMO Systems in 5G Networks." Journal of Electrical Systems 20, no. 3s (2024): 971–79. http://dx.doi.org/10.52783/jes.1411.

Full text
Abstract:
The following research focuses on the use of machine learning-based beamforming algorithms to improve Massive Multiple Input Multiple Output (MIMO) systems in 5G networks. Four unique algorithms namely, the Deep Learning Beamforming Algorithm (DLBA), Reinforcement Learning-Based Doa Estimation Algorithm (RLBEA), Clustering based beam forming algorithm(CBA) and GeneticAlgorithm Based Beam Forming Algoeithm were developed after which each of them was undertook evaluation. Widespread trials, in a simulated 5G environment, have revealed that the DLBA and RLBA considerably outperform other technolo
APA, Harvard, Vancouver, ISO, and other styles
8

Adane, Kibreab, Kedamo Mohammed, and Keyre Kemal. "Enhancing Cloud Computing Performance for Fast Online Services Delivery Using a Novel Hybrid Task Scheduling Algorithm." International Journal of Computer Information Systems and Industrial Management Applications 17 (May 29, 2025): 466–85. https://doi.org/10.70917/ijcisim-2025-0030.

Full text
Abstract:
Forwarding many tasks to the cloud server simultaneously degrades cloud computing performance in this regard, time-dependent sectors like banks, healthcare, airlines, online shopping, and more suffer from slow delivery of cloud computing services unless a suitable task scheduling technique is implemented. The existing literature-based evidence reveals that effective task scheduling in cloud computing optimizes resource usage, boosts fault tolerance, facilitates scalability, lowers costs, and reduces energy consumption. However, identifying task-scheduling algorithms that fulfill the stated ben
APA, Harvard, Vancouver, ISO, and other styles
9

ABIODUN, Ahmida, Olanrewaju LAWAL, Oyediran OYEBIYI, Odiete JOSEPH, and Adeyemi ADETORO. "Performance Evaluation of Selected Encryption Algorithms." International Journal of Information Security and Cybercrime 10, no. 2 (2021): 21–30. http://dx.doi.org/10.19107/ijisc.2021.02.03.

Full text
Abstract:
Data security is a key aspect of today’s communication trend and growth. Various mechanisms have been developed to achieve this security. One is cryptography, which represents a most effective method of enhancing security and confidentiality of data. In this work, a hybrid based 136bit key algorithm involving a sequential combination of XOR (Exclusive –Or) encryption and AES (Advanced Encryption Standard) algorithm to enhance the security strength is developed. The hybrid algorithm performance is matched with XOR encryption and AES algorithm using encryption and decryption time, throughput of
APA, Harvard, Vancouver, ISO, and other styles
10

Vanhatupa, Timo, Marko Hännikäinen, and Timo D. Hämäläinen. "Evaluation of throughput estimation models and algorithms for WLAN frequency planning." Computer Networks 51, no. 11 (2007): 3110–24. http://dx.doi.org/10.1016/j.comnet.2007.01.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Throughput Evaluation Algorithms"

1

Skone, Gwyn S. "Stratagems for effective function evaluation in computational chemistry." Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:8843465b-3e5f-45d9-a973-3b27949407ef.

Full text
Abstract:
In recent years, the potential benefits of high-throughput virtual screening to the drug discovery community have been recognized, bringing an increase in the number of tools developed for this purpose. These programs have to process large quantities of data, searching for an optimal solution in a vast combinatorial range. This is particularly the case for protein-ligand docking, since proteins are sophisticated structures with complicated interactions for which either molecule might reshape itself. Even the very limited flexibility model to be considered here, using ligand conformation ensemb
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmed, Toqeer. "Load balancing solution and evaluation of F5 content switch equipment." Thesis, Högskolan Dalarna, Datateknik, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:du-2356.

Full text
Abstract:
The Thesis focused on hardware based Load balancing solution of web traffic through a load balancer F5 content switch. In this project, the implemented scenario for distributing HTTPtraffic load is based on different CPU usages (processing speed) of multiple member servers.Two widely used load balancing algorithms Round Robin (RR) and Ratio model (weighted Round Robin) are implemented through F5 load balancer. For evaluating the performance of F5 content switch, some experimental tests has been taken on implemented scenarios using RR and Ratio model load balancing algorithms. The performance i
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Throughput Evaluation Algorithms"

1

Feld, Leonard G., and John D. Mahan. Succinct Pediatrics: Evaluation and Management of Infectious Diseases and Dermatology. American Academy of Pediatrics, 2016. http://dx.doi.org/10.1542/9781610020770.

Full text
Abstract:
Confidently evaluate evidence-based information to make timely and accurate diagnoses and treatment decisions! Continuing with this volume, Succinct Pediatrics will be an ongoing series covering the entire scope of pediatric medicine. Each volume will include short chapters with key features and invaluable tables and algorithms, allowing health care professionals the opportunity to deliver the highest quality of care. The second volume features 58 topics with key points and detailed therapies in Infectious Diseases and Dermatological Disorders. The book starts with an overview of the core know
APA, Harvard, Vancouver, ISO, and other styles
2

Feld, Leonard G., and John D. Mahan. Succinct Pediatrics: Evaluation and Management for Newborn, Genetic, Neurologic, and Developmental-Behavioral Disorders. American Academy of Pediatrics, 2017. http://dx.doi.org/10.1542/9781610021258.

Full text
Abstract:
Obtain evidence-based information to make timely and accurate diagnoses and treatment decisions. Continuing with this volume, Succinct Pediatrics is an ongoing series covering the entire scope of pediatric medicine. Each volume includes concise chapters with key features and invaluable tables and algorithms--resources health care professionals can use to deliver the highest quality of care. This third volume features 41 topics with key points and detailed therapies in neonatology, genetics, neurology, and developmental and behavioral disorders. Evidence-based levels of decision support are als
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Throughput Evaluation Algorithms"

1

Tinhofer, Ingeborg. "Innovations in Cell-Based Assays for Drug Discovery and Evaluation." In Critical Issues in Head and Neck Oncology. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-84539-0_4.

Full text
Abstract:
Abstract The field of drug development has seen significant advancements in recent years, primarily driven by the development of advanced preclinical models. Traditional drug screening methods often lack the biological relevance necessary to predict clinical outcomes accurately. Novel cell-based assays have emerged as a powerful tool to bridge this gap. These assays comprise various cellular models, including spheroids, organoids, and organotypic co-culture systems, to better mimic complex in vivo environments and cellular interactions. This improved physiological relevance enhances the identification of promising drug candidates while reducing the risk of costly late-stage failures. Furthermore, the incorporation of high-throughput automation and advanced imaging techniques has accelerated data collection and analysis. These innovations allow for the screening of compound libraries on a scale previously thought unattainable. Additionally, the integration of artificial intelligence and machine learning algorithms has enhanced data interpretation and the prediction of drug efficacy. This chapter aims to provide a thorough examination of the latest advancements in cell-based screening platforms, highlighting their potential clinical applications with specific examples. Emphasis will be placed on their utility for drug- and radiosensitivity screening and biomarker development in head and neck squamous cell carcinoma (HNSCC). Recent endeavours in automatization and miniaturization for high-throughput screenings will be explored, shedding light on their efficacy and assay turn-over times. Additionally, key factors essential for enhancing these platforms to facilitate their clinical implementation in precision medicine programs will be discussed.
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Chao. "Research on Dynamic Network Load Evaluation Algorithm Based on Throughput Monitoring." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36402-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Choumas, Kostas, Thanasis Korakis, Iordanis Koutsopoulos, and Leandros Tassiulas. "Implementation and End-to-end Throughput Evaluation of an IEEE 802.11 Compliant Version of the Enhanced-Backpressure Algorithm." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35576-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rachner, Jonas, Lea Kaven, Florian Voet, Amon Göppert, and Robert H. Schmitt. "Simulation-Based Potential Analysis of Line-Less Assembly Systems in the Automotive Industry." In Annals of Scientific Society for Assembly, Handling and Industrial Robotics 2022. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-10071-0_4.

Full text
Abstract:
AbstractIncreasing product variety, shorter product life cycles, and the ongoing transition towards electro-mobility demand higher flexibility in automotive production. Especially in the final assembly, where most variant-dependent processes are happening, the currently predominant concept of flowing line assembly is already been pushed to its flexibility limits. Line-less assembly systems break up the rigid line structures by enabling higher routing and operational flexibility using individual product routes that are takt-time independent. Hybrid approaches consider the combination of line and matrix-structured systems to increase flexibility while maintaining existing structures. Such system changes require a high planning effort and investment costs. For a risk-minimized potential evaluation, discrete-event simulation is a promising tool. However, the challenge is to model the existing line assembly concept and line-less assembly for comparison. In this work, a comprehensive scenario analysis based on real assembly system data is conducted to evaluate the potential of line-less assembly in the automotive industry. Within the simulation, an online scheduling algorithm for adaptive routing and sequencing is used. Based on an automated experiment design, several system parameters are varied full-factorially and applied to different system configurations. Various scenarios considering worker capabilities, station failures, material availability, and product variants are simulated in a discrete-event simulation considering realistic assumptions. Results show that the throughput and utilization can be increased in the hybrid and line-less systems when assuming that the stations will have failures and the assumption of an unchanged order input.
APA, Harvard, Vancouver, ISO, and other styles
5

Sang, Aimin, Guosen Yue, Xiaodong Wang, and Mohammad Madihian. "Cross-Layer Performance of Scheduling and Power Control Schemes in Space-Time Block Coded Downlink Packet Systems." In Handbook on Advancements in Smart Antenna Technologies for Wireless Networks. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-988-5.ch018.

Full text
Abstract:
In this chapter, we consider a cellular downlink packet data system employing the space-time block coded (STBC) multiple- input-multiple-output (MIMO) scheme. Taking the CDMA high data rate (HDR) system for example, we evaluate the cross-layer performance of typical scheduling algorithms and a point-to-point power control scheme over a time division multiplexing (TDM)-based shared MIMO channel. Our evaluation focuses on the role of those schemes in multi-user diversity gain, and their impacts on medium access control (MAC) and physical layer performance metrics for delay-tolerant data services, such as throughput, fairness, and bit or frame error rate. The cross-layer evaluation shows that the multi-user diversity gain, which comes from opportunistic scheduling schemes exploiting independent channel oscillations among multiple users, can increase the aggregate throughput and reduce the transmission error rate. It also shows that STBC/MIMO and one-bit and multi-bit power control can indeed help the physical and MAC layer performance but only at a risk of limiting the multiuser diversity gain or the potential throughput of schedulers for delay-tolerant bursty data services.
APA, Harvard, Vancouver, ISO, and other styles
6

Hemamalini, V., Amit Kumar Tyagi, V. Vennila, and Shabnam Kumari. "Revolutionizing drug Discovery With Cutting-Edge Technologies." In Converging Pharmacy Science and Engineering in Computational Drug Discovery. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-2897-2.ch004.

Full text
Abstract:
This chapter discusses the transformative potential of cutting-edge technologies in revolutionizing drug discovery processes, highlighting key issues and challenges anticipated in the next decade. The integration of technologies such as artificial intelligence (AI), high-throughput screening, CRISPR/Cas9 gene editing, and advanced analytics is poised to reshape the landscape of pharmaceutical research, promising accelerated development timelines and enhanced therapeutic outcomes. Artificial intelligence, particularly machine learning algorithms, plays a central role in data analysis, target identification, and drug repurposing. High-throughput screening technologies enable the rapid evaluation of large compound libraries, expediting the identification of lead compounds and optimizing drug development pipelines. CRISPR/Cas9 gene editing provides unprecedented precision in modifying genetic material, opening avenues for the development of more targeted and personalized therapies.
APA, Harvard, Vancouver, ISO, and other styles
7

Dansana, Debabrata, and Rakesh K. Kadu. "FPGA Implementations of Secure Cryptographic Algorithms for Embedded Systems." In Smart Microcontrollers and FPGA Based Architectures for Advanced Computing and Signal Processing, 2025th ed. RADemics Research Institute, 2025. https://doi.org/10.71443/9789349552425-11.

Full text
Abstract:
The escalating demand for secure communication in embedded systems, particularly in the context of the Internet of Things (IoT), necessitates cryptographic implementations that are both efficient and resilient. Field-Programmable Gate Arrays (FPGAs) have emerged as an ideal platform for deploying lightweight cryptographic algorithms due to their reconfigurability, parallelism, and suitability for low-power designs. This chapter presents a comprehensive exploration of FPGA-based implementations of secure cryptographic primitives tailored for embedded applications. Emphasis is placed on the design, optimization, and benchmarking of both symmetric and asymmetric algorithms, focusing on reducing hardware footprint, minimizing power consumption, and maximizing throughput without compromising cryptographic strength. The discussion includes resource-sharing methodologies, memory footprint reduction techniques, and power-performance balancing strategies essential for real-world deployment. The chapter highlights side-channel resistance and hardware Trojan mitigation mechanisms to ensure system trustworthiness. Practical case studies demonstrate the application of these cryptographic solutions in secure communication for IoT nodes, wearable devices, and automotive systems. Evaluation frameworks encompassing throughput, latency, energy efficiency, and resistance to physical attacks are employed to benchmark performance across various use cases. Through architectural innovations and optimization practices, the presented FPGA designs offer a secure and scalable foundation for next-generation embedded systems. This work contributes to the advancement of secure hardware design by aligning cryptographic strength with resource-constrained requirements of edge devices. It bridges the gap between theoretical cryptographic constructs and their practical hardware realization, facilitating trustworthy and efficient embedded security.
APA, Harvard, Vancouver, ISO, and other styles
8

Tchagang, Alain B., Youlian Pan, Fazel Famili, Ahmed H. Tewfik, and Panayiotis V. Benos. "Biclustering of DNA Microarray Data." In Handbook of Research on Computational and Systems Biology. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-491-2.ch007.

Full text
Abstract:
In this chapter, different methods and applications of biclustering algorithms to DNA microarray data analysis that have been developed in recent years are discussed and compared. Identification of biological significant clusters of genes from microarray experimental data is a very daunting task that emerged, especially with the development of high throughput technologies. Various computational and evaluation methods based on diverse principles were introduced to identify new similarities among genes. Mathematical aspects of the models are highlighted, and applications to solve biological problems are discussed.
APA, Harvard, Vancouver, ISO, and other styles
9

Alhaj, Abdullah A. "Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)." In Cloud Technology. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6539-2.ch038.

Full text
Abstract:
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication. With the increasing demand for computer communications the need for security is growing dramatically. The existing research related to security mechanisms focuses on security of the data transmission in the communication networks only. The authors developed specific Secure Data Transmission Mechanism (S SDTM) for cloud outsourced data is a set of technologies and solutions to enforce security policy and bandwidth compliance on all devices seeking to access network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these algorithms are computationally sophisticated, some hardware accelerators are needed to support high throughput. In this paper, the authors compare between secure data transmission mechanism for cloud outsourced data with preemption control algorithm and TLS to improve the properties of the S SDTM and the Virtual Private Networks (VPN) built with both protocols.
APA, Harvard, Vancouver, ISO, and other styles
10

Afrose, Naureen, Rideb Chakraborty, Ahana Hazra, Pratibha Bhowmick, and Mithun Bhowmick. "AI-Driven Drug Discovery and Development." In Future of AI in Biomedicine and Biotechnology. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-3629-8.ch013.

Full text
Abstract:
Artificial intelligence (AI) has revolutionized the discovery and development of new drugs in biomedicine. By using advanced algorithms and computational methods, AI optimizes treatment plans, accelerates the drug development process, and improves patient outcomes. AI algorithms integrate multi-omics data sets, decipher molecular connections, and identify therapeutic targets and biomarkers. High-throughput screening, predictive modeling, and AI-powered virtual screening platforms are revolutionizing the drug development pipeline. Machine learning and deep learning models enable drug-target interactions prediction, pharmacological evaluation, and experimental validation. Structure-based drug design methodologies accelerate the discovery of new therapies. AI-driven technologies enable personalized treatment plans for patients, taking into account their unique traits and disease profiles. Pharmacogenomics, when combined with predictive analytics, improves drug selection, dosage adjustment, and treatment response prediction, enhancing therapeutic efficacy and reducing side effects.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Throughput Evaluation Algorithms"

1

Tajima, Keito, Naoki Ichijo, Yuta Nakahara, Koshi Shimada, and Toshiyasu Mathushima. "An Algorithmic Framework for Constructing Multiple Decision Trees by Evaluating Their Combination Performance Throughout the Construction Process." In 2024 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2024. https://doi.org/10.1109/smc54092.2024.10830978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bershadsky, Dmitry, and Eric Johnson. "Benchmarking of UAV Guidance Systems in Nap of the Earth (NOE) Flight." In Vertical Flight Society 70th Annual Forum & Technology Display. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9672.

Full text
Abstract:
This paper describes the development of a proposed framework of metrics for the evaluation of the performance of aircraft guidance systems. The methodologies and metrics developed remain generally agnostic to whether or not the aircraft is manned. Although more complicated missions such as autonomous exploration/search, ferry, surveillance, multi-agent collaboration, and manned flight may be addressed at a later time, A-B flight scenarios are chosen to study the proposed metrics. The proposed metrics will form building blocks for the more complicated missions. Metrics development has thus far
APA, Harvard, Vancouver, ISO, and other styles
3

Peeters, G. T., and B. Van Houdt. "Improved High Maximum Stable Throughput FCFS Tree Algorithms with Interference Cancellation." In 3rd International ICST Conference on Performance Evaluation Methodologies and Tools. ICST, 2008. http://dx.doi.org/10.4108/icst.valuetools2008.4257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vanhatupa, Timo, Marko Hännikäinen, and Timo D. Hämäläinen. "Evaluation of throughput estimation models and algorithms for WLAN frequency planning." In the 3rd international conference. ACM Press, 2006. http://dx.doi.org/10.1145/1185373.1185431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bo, Chen, Hou Xiaolin, and Shichuan Ma. "Throughput Evaluation of Fixed Beams in a TD-SCDMA HSDPA System Using Different CQI Feedback Algorithms." In 2008 IEEE 68th Vehicular Technology Conference (VTC 2008-Fall). IEEE, 2008. http://dx.doi.org/10.1109/vetecf.2008.280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pellegrini, Joseph C., Ziad R. Hatab, Jeffrey M. Bush, and Thomas R. Glass. "Supersparse overlay sampling plans: an evaluation of methods and algorithms for optimizing overlay quality control and metrology tool throughput." In Microlithography '99, edited by Bhanwar Singh. SPIE, 1999. http://dx.doi.org/10.1117/12.350780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Almeida, Leandro C. de, Paulo Ditarso Maciel Jr., and Fábio L. Verdi. "Evaluating L4S Framework Performance with Programmable Data Plane Hardware." In Workshop de Gerência e Operação de Redes e Serviços. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/wgrs.2024.3286.

Full text
Abstract:
L4S, which stands for Low Latency, Low Loss, Scalable Throughput, is an initiative within the Internet Engineering Task Force (IETF) dedicated to enhancing the performance of real-time interactive applications across the Internet, like online gaming, video conferencing, and virtual reality. Its core principles revolve around implementing a novel variant of congestion control (CC) algorithm on end hosts and deploying an Active Queue Management (AQM) scheme on network nodes. Evaluating AQM algorithm adherence within the L4S framework on conventional network devices is challenging due to limited
APA, Harvard, Vancouver, ISO, and other styles
8

Luiz, Douglas Pereira, and Odorico Machado Mendizabal. "Lightweight Asynchronous Repartitioning for Local State Partitioned Systems." In Simpósio em Sistemas Computacionais de Alto Desempenho. Sociedade Brasileira de Computação, 2024. http://dx.doi.org/10.5753/sscad.2024.244785.

Full text
Abstract:
Partitioning strategies combined with rebalancing algorithms can be used to balance the load in high-throughput systems. Keeping the load balanced constantly is desirable, but the cost of repartitioning can be high. This work presents a rebalancing strategy based on balanced graph partitioning algorithms with low impact during rebalancing operations. The new technique allows for frequent partitioning updates by decoupling the repartitioning process from the rest of the system, thereby avoiding disruptions within the system due to the calculation of new partitioning schemas. In experimental eva
APA, Harvard, Vancouver, ISO, and other styles
9

Siciliano, Giulia, Yue Yu, and Johannes Fottner. "Synergy between Shuttles and Stacker Cranes in Dynamic Hybrid Pallet Warehouses: Control Strategies and Performance Evaluation." In 36th ECMS International Conference on Modelling and Simulation. ECMS, 2022. http://dx.doi.org/10.7148/2022-0143.

Full text
Abstract:
This article considers two dynamic hybrid pallet warehouses obtained hybridizing a shuttle-based warehouse with stacker cranes. We begin by describing their design and characteristics. Afterwards, we explain the control algorithms that were developed for them. Next, we illustrate the modalities of the discrete event simulation study we ran to investigate their performance. In conclusion, we discuss the results in terms of throughput of the simulation study to individuate the field of application for the two layouts of dynamic hybrid pallet warehouses in comparison to stacker crane-based and sh
APA, Harvard, Vancouver, ISO, and other styles
10

Oluwatope, Ayodeji, Biodun Obabire, G. Adesola Aderounmu, and Matthew Adigun. "End-to-End Performance Evaluation of Selected TCP Variants across a Hybrid Wireless Network." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/3022.

Full text
Abstract:
Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion. TCP is intended for use as a highly reliable end-to-end transport protocol for transporting applications such as World-Wide Web (WWW) between hosts in packet-switched computer communication networks. TCP was originally designed for wired links where the error rate is really low and actually assumed that packet losses are due to congestion in the network. However, the increasing popularity of wireless networks indicates that wireless links will play
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Throughput Evaluation Algorithms"

1

Sakulneya, Apidej, and Jeffery Roesler. Smart Construction Work-Zone Safety with V2I Passive Material Sensing. Illinois Center for Transportation, 2024. https://doi.org/10.36501/0197-9191/24-027.

Full text
Abstract:
This study explored new vehicle to infrastructure (V2I) technology in construction work zones (CWZ), where speeding, unsafe driving behaviors, and drivers' failure to obey traffic signs contribute significantly to elevated accident rates and fatalities. The objective of this research to advance CWZ safety by evaluating the potential of 3-axis magnetometers attached to a moving cart and traversing over a pavement-assisted passive sensing system can improve vehicle lateral positioning and warning in CWZ. Secondly, to develop a process to implement a programmable ferromagnetic oxide material for
APA, Harvard, Vancouver, ISO, and other styles
2

Gur, Amit, Edward Buckler, Joseph Burger, Yaakov Tadmor, and Iftach Klapp. Characterization of genetic variation and yield heterosis in Cucumis melo. United States Department of Agriculture, 2016. http://dx.doi.org/10.32747/2016.7600047.bard.

Full text
Abstract:
Project objectives: 1) Characterization of variation for yield heterosis in melon using Half-Diallele (HDA) design. 2) Development and implementation of image-based yield phenotyping in melon. 3) Characterization of genetic, epigenetic and transcriptional variation across 25 founder lines and selected hybrids. The epigentic part of this objective was modified during the course of the project: instead of characterization of chromatin structure in a single melon line through genome-wide mapping of nucleosomes using MNase-seq approach, we took advantage of rapid advancements in single-molecule se
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!