Search Results - (( java application clustering algorithm ) OR ( source evaluation path algorithm ))
Search alternatives:
- application clustering »
- source evaluation »
- java application »
- evaluation path »
- path algorithm »
-
1
Shortest Path Trajectory System Based on Dijkstra Algorithm
Published 2012“…This project aims to determine locations of the node that reflect all the items in the list, build the route by connecting nodes and evaluate the proposed algorithm for the single source shortest path problem. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
3
Comparison of performance and computational complexity of nonlinear active noise control algorithms
Published 2011“…In this paper, systematic comparisons of the FXLMS against the nonlinear algorithms are evaluated in overcoming various nonlinearity sources. …”
Get full text
Get full text
Get full text
Article -
4
All-pass filtered x least mean square algorithm for narrowband active noise control
Published 2018“…Here first-order all pass filters with single parameter is used to improve the convergence of the LMS algorithm. The performance evaluation in terms of convergence speed of the proposed algorithm is validated with standard ANC without secondary path modelling. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
6
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…Case study evaluation was conducted based on three industrial open source case studies in order to evaluate empirically the significant of the performance of the proposed method. …”
Get full text
Get full text
Get full text
Thesis -
7
Artificial Bee Colony for Minimizing the Energy Consumption in Mobile Ad Hoc Network
Published 2019“…As such, it can be concluded that optimizing the path from the source to the destination has a significant impact on the quality of the network performance. …”
Get full text
Get full text
Article -
8
-
9
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
10
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
12
A web-based implementation of k-means algorithms
Published 2022“…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
-
15
Traffic management algorithms for LEO satellite networks
Published 2016“…In order to evaluate the proposed algorithm, a series of experiments to implement Discrete Event Simulation (DES) of a LEO satellite network by using ns-2 and C/C++ are conducted. …”
Get full text
Get full text
Get full text
Thesis -
16
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…The study investigates in four difierent scenarios and detects both types of wormhole attacks. Experimental evaluation shows that NIPT algorithm achieves better results in the PDR and delay with an average of 5% and 6% respectively, over the PT algorithm. …”
Get full text
Get full text
Thesis -
17
Development of a State-Space Observer for Active Noise Control Systems
Published 2009“…The criterions of success considered the evaluation process are the length of the propagation path, level of cancellation, convergence rate, number of modes of each path, and destructive interferences occur at the cancellation path. …”
Get full text
Get full text
Thesis -
18
Optimizing the latency of the 4G network by using Routing Algorithm / Rossidah Wan Abdul Aziz ... [et al.]
Published 2022“…The Routing Algorithm hasbeen used todetermine the route or path that data packets will take from source to destination. …”
Get full text
Get full text
Monograph -
19
Machine Learning-Enabled Communication Approach for the Internet of Medical Things
Published 2023“…For this purpose, the proposed scheme utilises a well-known technique, i.e., Kruskal’s algorithm, to find an optimal path from source to destination wearable devices. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…In practical ANC applications, nonlinearity effects degrade the performance of conventional linear control algorithm. The nonlinearity sources could originate from the noise process, primary and secondary acoustical propagation paths, or from the transducers consisting of loudspeaker, microphone or amplifier. …”
Get full text
Get full text
Thesis
