Search Results - (( intelligence based vs algorithm ) OR ( intelligence p path algorithm ))
Search alternatives:
- intelligence based »
- intelligence p »
- path algorithm »
- vs algorithm »
- based vs »
- p path »
-
1
-
2
DNA sequence design for direct-proportional length-based DNA computing: Particle swarm optimization vs population based ant colony optimization
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
3
A novel Bezier curve control point search algorithm for autonomous navigation using N-order polynomial search with boundary conditions
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Advanced computational geometry for proximity queries of convex polyhedras
Published 2009Get full text
Working Paper -
6
-
7
-
8
-
9
Evaluating Adan vs. Adam: an analysis of optimizer performance in deep learning
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid
Published 2013“…At first, in producing a good optimization algorithm, a hybridization technique was proposed for adopting the finest features of two different algorithms; namely the Genetic Algorithm (GA) and continuous domain Ant Colony Optimization (ACOr). …”
Get full text
Get full text
Thesis -
12
-
13
Design And Development Of Collision Avoidance Strategy For Differential Drive Mobile Robot
Published 2018“…In order to evaluate the performance of the proposed methods, a MATLAB Graphical User Interface (GUI) is created to plot the targeted and real path of the robot. In this work, it is shown that both algorithms provide good collision avoidance strategy with a maximum error of only 5cm.…”
Get full text
Get full text
Monograph -
14
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…Also, the volume of P2P traffic is on the rise. P2P and DSD applications function by forming an overlay on top of the existing IP layer (underlay layer). …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…The Weakest Path (WP), Mean Vulnerabilities on Path (MVoP), and Number of Vulnerabilities (NV) are three metrics introduced in this thesis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Dynamic role engine and formation control for cooperating agents
Published 2009Get full text
Working Paper -
19
-
20
