Search Results - (( data detection method algorithm ) OR ( data optimization path algorithm ))
Search alternatives:
- data optimization »
- optimization path »
- method algorithm »
- data detection »
- path algorithm »
-
1
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The existing infeasible path detection methods are restricted to extended finite state machine (EFSM) models with integer data type only. …”
Get full text
Get full text
Get full text
Thesis -
2
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The results demonstrated that the proposed method could generate an optimal collision-free path. …”
Get full text
Thesis -
3
Novel algorithm for mobile robot path planning in constrained environment
Published 2021“…Moreover, the performance of the proposed method was compared with the A-star and laser simulator (LS) algorithms in terms of path length, computational time and path smoothness. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
Get full text
Get full text
Conference or Workshop Item -
5
Novel algorithm for mobile robot path planning in constrained environment
Published 2022“…Moreover, the performance of the proposed method was compared with the A-star and laser simulator (LS) algorithms in terms of path length, computational time and path smoothness. …”
Get full text
Get full text
Get full text
Article -
6
Novel algorithm for mobile robot path planning in constrained environment
Published 2022“…Moreover, the performance of the proposed method was compared with the A-star and laser simulator (LS) algorithms in terms of path length, computational time and path smoothness. …”
Get full text
Get full text
Get full text
Article -
7
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
8
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
9
Comprehensive review of drones collision avoidance schemes: challenges and open issues
Published 2024“…We explore collision avoidance methods for UAVs from various perspectives, categorizing them into four main groups: obstacle detection and avoidance, collision avoidance algorithms, drone swarm, and path optimization. …”
Get full text
Get full text
Get full text
Article -
10
Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel
Published 2016“…Results show that the defect detection algorithm able to detect defect only on the scratch area and able to read the Ga value at detected scratch line and transform it to surface roughness measurement at considerably good level of accuracy compared with manual method. …”
Get full text
Get full text
Thesis -
11
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
Published 2024“…PMTRF modules and their algorithms enable the isolation of the maintenance switch and the selection of the most reliable path for future affected flows based on input time provided by the administrator. …”
Get full text
Get full text
Get full text
Thesis -
15
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…To deal with these issues, adaptive sampling algorithm is applied to the data points to adhere to the manipulators speed constraints. …”
Get full text
Get full text
Thesis -
16
-
17
A Novel Integrating Between Tool Path Optimization Using An ACO Algorithm And Interpreter For Open Architecture CNC System
Published 2021“…Furthermore, high-performing Ant Colony Optimization (ACO) algorithms were used to optimize the travel path time. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
An Experiment of Ant Algorithms : Case Study of Kota Kinabalu Central Town
Published 2005“…There are many algorithms that used to solve this problem. In this study, ant algorithms are used to find the shortest path using a real data. …”
Get full text
Get full text
Get full text
Thesis -
19
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…As a result, the evacuation route model is able to gain the shortest path and safest path consistently between Dijkstra’s algorithms and hybrid version which is Dijkstra-Ant Colony Optimization (DACO). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Railway shortest path planner application using ant colony optimization algorithm / Muhammad Hassan Firdaus Ruslan
Published 2017“…For the process module, Ant Colony Optimization (ACO) algorithm was used to find the shortest path. …”
Get full text
Get full text
Thesis
