Search Results - (( java application modified algorithm ) OR ( user evaluation path algorithm ))
Search alternatives:
- application modified »
- java application »
- user evaluation »
- evaluation path »
- path algorithm »
-
1
Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria
Published 2018“…Dijkstra’s Algorithm is a shortest path algorithm that considers a single criterion only. …”
Get full text
Get full text
Get full text
Article -
2
The Effect of Rainfall on the UAV Placement for 5G Spectrum in Malaysia
Published 2023“…The problem of finding the UAV 3D placement is formulated with the objective to minimize the total path loss between the UAV and all users. The problem is solved by invoking two algorithms, namely Particle Swarm Optimization (PSO) and Gradient Descent (GD) algorithms. …”
Article -
3
Vision-based robot indoor navigation
Published 2022“…An algorithm is developed in the computer to achieve image processing, user input, path planning, simulation, and writing of output files. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
AUTOMATED GUIDED ROBOT (AGR)
Published 2007“…Compared to manual mobile robots, AGRs require sensors and control systems that generate feedback for the re-evaluation of an unexpected situation and to detect obstacles in the path the AGR is required to follow. …”
Get full text
Get full text
Final Year Project -
5
Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios
Published 2015“…While some scheduling algorithm take the moderate path but still be lacking especially in Edge Cell User Throughput necessitating the use of Relays or femtocells.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
7
Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios
Published 2014“…While some scheduling algorithm take the moderate path but still be lacking especially in Edge Cell User Throughput necessitating the use of Relays or femtocells.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…The performance of the proposed routing algorithm is evaluated utilizing MATLAB. The assessment results indicate that it can find the forwarding path with comparatively low cost in the premise of ensuring security and has minimized the average energy consumption by nearly 50% even as the number of nodes has increased, when compared with the traditional ACO algorithm, an existing ant colony based routing algorithm and a current routing protocol for IoT.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network
Published 2019“…The element of Shortest Path First (SPF) Algorithm that is used in a routing protocol will be implemented. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Scheduling tight deadlines for scientific workflows in the cloud
Published 2018“…The work in this paper focuses on the hurdle of scheduling tight deadline scientific workload. This article will evaluate the performance of the Proportional Deadline Constrained (PDC) algorithm using Cloudsim and compare it with the Deadline Constrained Critical Path (DCCP) scheduling algorithm. …”
Get full text
Get full text
Thesis -
11
Optimizing the latency of the 4G network by using Routing Algorithm / Rossidah Wan Abdul Aziz ... [et al.]
Published 2022“…The Routing Algorithm hasbeen used todetermine the route or path that data packets will take from source to destination. …”
Get full text
Get full text
Monograph -
12
Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks
Published 2014“…All these achieved because the proposed algorithm targets those users located at the cluster borders who more likely cause rank deficiency. …”
Get full text
Get full text
Thesis -
13
The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail
Published 2017“…This project use usability test for user testing system and functionality test to evaluate the efficiency of the game. …”
Get full text
Get full text
Thesis -
14
Design And Development Of Collision Avoidance Strategy For Differential Drive Mobile Robot
Published 2018“…In order to evaluate the performance of the proposed methods, a MATLAB Graphical User Interface (GUI) is created to plot the targeted and real path of the robot. …”
Get full text
Get full text
Monograph -
15
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
16
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
17
Discrete simulation framework for wireless cellular networks.
Published 2008“…The simulator is built from the scratch to enable customization requirements of any research and to provide the freedom to understand, configure protocol modules, draw desired topologies and specifies the movement paths of the mobile users and to plot the necessary performance graphs. …”
Get full text
Get full text
Article -
18
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
19
Performance Enhancement Of Ultra-Wideband Power Control Using Ranging And Narrowband Interference Mitigation
Published 2008“…In this thesis we propose a maximum likelihood algorithm enhanced with synchronization scheme to estimate the time delay of direct-path signal in NLOS multi-path fading environment and mean acquisition time. …”
Get full text
Get full text
Thesis -
20
