Search Results - (( java implementation drops algorithm ) OR ( using usage path algorithm ))
Search alternatives:
- implementation drops »
- java implementation »
- path algorithm »
- using usage »
- usage path »
-
1
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
2
The impact of clustering on the average path length in wireless sensor networks
Published 2015“…Clustering algorithms have been widely used in wireless sensor networks for virtual backbone construction. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Empirical analysis and optimization suggestions of Peking Opera audience's use intention of Kuaishou app
Published 2026“…The test of the moderating effect finds that Peking Opera exposure experience produces a significant moderating effect in all paths where independent variables influence usage intention, while age only exerts a specific moderating effect in the paths of effort expectancy and algorithm recommendation on usage intention. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Multi-drones energy efficient based path planning optimization using Genetic Algorithm and Gradient Decent approach
Published 2024“…The paper introduces an efficient energy optimization technique for multi-drones through path planning using Genetic Algorithm (GA) and Gradient Descent (GD). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Design of radix-4 single path delay fast fourier transform processor with genetic algorithms optimization
Published 2011“…This research work involves the implementation of Single Objective Genetic Algorithm (SOGA) and Multi-objectives Genetic Algorithm (MOGA) in a 16-point Radix-4 Single Path Delay Feedback (R4SDF) pipelined Fast Fourier Transform (FFT) processor. …”
Get full text
Get full text
Thesis -
6
Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET
Published 2022“…It minimizes the transmission rate and network lifetime and improves packet latency and energy usage. The proposed novel link establishment communication (NLEC) technique is used to find the dependable routing path against intruder node available in the network. …”
Get full text
Get full text
Article -
7
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
Published 2012“…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
Get full text
Get full text
Thesis -
8
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. …”
Get full text
Get full text
Get full text
Thesis -
9
Ant-based vehicle congestion avoidance framework using vehicular networks / Mohammad Reza Jabbarpour Sattari
Published 2015“…Previous researches concentrated on using static algorithms to find the shortest path in VTRSs. …”
Get full text
Get full text
Thesis -
10
Deadline guarantee for scientific workflow using dynamic scheduling algorithms on IaaS clouds
Published 2018“…Finally, we expected the scheduling algorithms PDC and DCCP to be improve the Cloud resource usage high efficiency in the IaaS Cloud with efficient scheduling for scientific workflow.…”
Get full text
Get full text
Thesis -
11
-
12
-
13
Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal
Published 2017“…Based on the concept, pheromone saturation is used to combine stackable solution pattern that is discovered while straying to different term node to build a path. …”
Get full text
Get full text
Thesis -
14
An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks
Published 2018“…In this work, an energy based cluster head selection unequal clustering algorithm (ECH-DUAL) using dual (static and mobile) sink is proposed. …”
Get full text
Get full text
Article -
15
Modelling and Optimization of Asymmetric Vehicle Routing Problem Using Particle Swarm Optimization Algorithm
Published 2021“…Asymmetric vehicle routing problem (AVRP) appeared when the const of delivering and returning route using the same path were difference. It was used in practical applications to solve AVRP problems identified for specific application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A Mininet emulation study for SDN fat tree data center sleep mode routing algorithms
Published 2025“…In this work meta heuristic algorithm is incorporated at the SDN central controller in a fat tree-based data centre for bandwidth usage monitoring, sleep decisions and path selection using Mininet emulation. …”
Article -
17
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…For this issue, this study proposes using the naïve approach prune algorithm and using Personal agents to reduce the reachability time in calculating between the nodes and to remove unnecessary edges, minimizing the attack graph’s complexity. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Long-term rain attenuation probability and site diversity gain prediction formulas
Published 2007“…The ITU-R study Group 3 database is used in this project.…”
Get full text
Get full text
Thesis -
19
Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device
Published 2021“…One of the proposals that could help solve this problem is the use of brain-computer interface (BCI)s. Brain-Computer Interface (BCI) can be used as a direct communication path between the brain and an external device. …”
Get full text
Thesis -
20
Optimal Route Determination System (ORDS) for Pedestrian Safety
Published 2009“…This paper proposes a map application designed for pedestrian safety that recommends the safest path based on user inset criteria, safe route determination algorithm and knowledge base. …”
Get full text
Get full text
Final Year Project
