Search Results - (( developing agent prevention algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- prevention algorithm »
- implication based »
- developing agent »
- agent prevention »
- java implication »
-
1
A simulated Kalman filter optimizer with white hole operator
Published 2018“…Meanwhile, a white hole operator has been recently introduced to prevent premature convergence in black hole algorithm (BHA). …”
Get full text
Get full text
Get full text
Article -
2
-
3
Reinforcement learning-based target tracking for unmanned aerial vehicle with achievement rewarding and multistage traning
Published 2022“…Fourth, an enhancement of the rewarding function by including piecewise decomposition was used to enable more stable learning behaviour of the policy and move out from the linear reward to the achievement formula. Fifth, a novel agent selection algorithm was developed to enable the selection of the best agent and avoid under-fitting and over-fitting. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Deep reinforcement learning based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles
Published 2022“…Finally, in the safety efficiency analysis phase, we investigated the safety efficiency performance of the agent vehicle in both single-agent and multi-agent autonomous driving environments. …”
Get full text
Get full text
Get full text
Article -
5
Deep reinforcement learning-based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles
Published 2022“…Finally, in the safety efficiency analysis phase, we investigated the safety efficiency performance of the agent vehicle in both single-agent and multi-agent autonomous driving environments. …”
Get full text
Get full text
Get full text
Article -
6
Development of collision avoidance system for multiple autonomous mobile robots
Published 2023Article -
7
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
8
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
9
Development of autonomous radiation mapping robot
Published 2017“…A grid based algorithm was develop to build the radiation map. The system was then tested under several conditions. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Twin delayed deep deterministic policy gradient-based target tracking for unmanned aerial vehicle with achievement rewarding and multistage training
Published 2022“…In this article, the Twin Delayed Deep Deterministic Policy Gradient Algorithm (TD3), as recent and composite architecture of RL, was explored as a tracking agent for the UAV-based target tracking problem. …”
Get full text
Get full text
Get full text
Article -
11
Development of autonomous radiation mapping robot
Published 2017“…A grid based algorithm was develop to build the radiation map. The system was then tested under several conditions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Inhibition of dengue virus entry into target cells using synthetic antiviral peptides
Published 2013“…Moreover these peptides though designed against the conserved region in DENV-2 would have the potential to be active against all the serotypes of dengue and might be considered as Hits to begin designing and developing of more potent analogous peptides that could constitute as promising therapeutic agents for attenuating dengue infection.…”
Get full text
Get full text
Article -
13
Solubility enhancement of decitabine as anticancer drug via green chemistry solvent: Novel computational prediction and optimization
Published 2022“…Decitabine with the chemical formula C₈H₁₂N₄O₄ is a chemotherapeutic agent applied for the treatment of disparate bone-marrow-related malignancies such as acute myeloid leukemia (AML) by preventing DNA methyltransferase and activation of silent genes. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…Moreover, at present, the control plane has no built-in security mechanism that prevents malicious SDN agents from sending authorized but forged flows to corrupt the controller state or bring the entire network down, in the worst case, even if the OpenFlow is Transport Layer Security (TLS) enabled. …”
Get full text
Get full text
Thesis
