Search Results - (( dynamic bandwidth detection algorithm ) OR ( dynamic candidate detection algorithm ))
Search alternatives:
- bandwidth detection »
- candidate detection »
-
1
-
2
Efficient distance computation algorithm between nearly intersected objects using dynamic pivot point in virtual environment application
Published 2014Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Efficient distance computation algorithm between nearly intersect objects using dynamic pivot point in virtual environment application
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Adaptable decentralized orchestration engine for block structured non-transactional workflow in service oriented architecture.
Published 2011“…The latter considers the frequent-path adaptability and both of them together satisfy both frequent-path and proportionalfragment adaptability aspects; v) A Fuzzy Decentralization Decision Making algorithm (FDDM) is presented based on the fuzzy logic to choose a suitable method of decentralization that satisfies the three adaptability aspects frequent-path,proportional- fragment and available-bandwidth; and, vi) an algorithm is introduced for wiring of dynamic fragments. …”
Get full text
Get full text
Thesis -
5
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
6
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…First, a content negotiation and adaptation architecture was proposed to facilitate the process of identifying and detecting client device. It differs from other existing content negotiation approaches by introducing the idea of combining dynamic and static device capabilities detection methods. …”
Get full text
Get full text
Thesis -
7
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…FPF of SVM have merged the analyzed results of flexible packet filtering with support vector machine algorithm to get better classification of the captured network traffics and to detect anomalies. …”
Get full text
Get full text
Get full text
Thesis -
8
A generalized laser simulator algorithm for mobile robot path planning with obstacle avoidance
Published 2022“…The obstacle borders are regarded as the environment’s borders for static obstacle avoidance. However, once dynamic obstacles appear in front of the GLS waves, the system detects them as new dynamic obstacle borders. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Hence, the algorithm must overcome the problem of dynamic updates in the internal parameters or counter the concept drift. …”
Get full text
Get full text
Thesis -
10
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
Get full text
Get full text
Thesis -
11
Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing
Published 2022“…The proposed approach, Energy-Aware Multi-Dimensional Online Bin Packing (EAMDOBP), was tested against Power-aware best fit decreasing algorithm (PABFD), Modified Worst Fit decreasing algorithm (MWFD) and Hybrid Local Regression Host Overload Detection (HLRHOD). …”
Get full text
Get full text
Get full text
Thesis -
12
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…Specifically, the objectives of this thesis are (i) to develop an image registration technique based on multigraph matching, (ii) to detect occluded objects through exploration of candidate object correspondences in longer frame sequences, and (iii) to develop a robust graph coloring algorithm for multiple moving object detection under different transformations. …”
Get full text
Get full text
Get full text
Thesis -
13
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…For static obstacle avoidance, the boundaries of the obstacle(s) are considered borders of the environment. However, the algorithm detects obstacles as a new border in dynamic obstacles once it occurs in front of the GLS waves. …”
Get full text
Thesis -
14
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
15
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…Finally, the algorithm Void Avoidance Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with the communication void by introducing a simple method to detect a void node and avoid it during the forwarding process. …”
Get full text
Get full text
Thesis -
16
A multi-color based features from facial images for automatic ethnicity identification model
Published 2019“…In the feature extraction process, a dynamic skin color detection is adapted to extract the skin color information from the face candidate. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
Published 2006“…Moreover, three proposed approaches for gateway discovery are implemented; propose a forwarding algorithm, and route determination algorithm for default route and host route in MANET are investigated.…”
Get full text
Get full text
Thesis
