Search Results - (( java implication based algorithm ) OR ( next generation path algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Optimised multi-robot path planning via smooth trajectory generation by Loke, Zhi Yu

    Published 2024
    “…A MPSO algorithm, without path smoothening, is used for comparison. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The mean path cost generated by the LS algorithm, on the other hand, is 14% higher than that generated by the PRM. …”
    Get full text
    Thesis
  3. 3

    Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment by Nurul Atikah Janis

    Published 2018
    “…Bresenham Line Algorithm is a line generation algorithm using integer arithmetic where the points (x1, y1) and (x2, y2) are assumed not equal and integer valued. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics by Al-Araji, Zaid Jasim Mohammed

    Published 2023
    “…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Attack prediction to enhance attack path discovery using improved attack graph by Al-Araji, Zaid Jasim, Abdullah, Raihana Syahirah, Syed Ahmad, Sharifah Sakinah

    Published 2022
    “…The next-generation cyber defense that relies on predictive analysis is more proactive than existing technologies that rely on intrusion detection. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Implement edge pruning to enhance attack graph generation using the naïve approach algorithm by Al-Araji, Zaid J., Mutlag, Ammar Awad, Syed Ahmad, Sharifah Sakinah

    Published 2024
    “…The attack surface for hackers is growing as more devices are linked to the internet. The next generation cyber defence concentrating on predictive analysis seems more proactive than existing technologies based on intrusion detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Fair and fit resource allocation algorithm for network-controlled device-to-device (D2D) communication / Yusmardiah Yusuf, Darmawaty Mohd. Ali and Roslina Mohamad by Yusuf, Yusmardiah, Mohd. Ali, Darmawaty, Mohamad, Roslina

    Published 2021
    “…In this paper, a Fair and Fit Resource Allocation (FFRA) algorithm is proposed which exploits the path loss experienced by the potential D2D user equipments (UEs) when choosing the communication path. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Improvement of Centralized Routing and Scheduling Using Cross-Layer Design and Multi-Slot Assignment in Wimax Mesh Networks by Al-Humairi, Ali Zuhair Abdulameer

    Published 2009
    “…This thesis also proposes a centralized scheduling algorithm that can avoid the collision by constructing routing path with multi-slot single transceiver system for WiMAX mesh networks. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Discrete simulation framework for wireless cellular networks. by Al-Sanabani, Maher Ali, K. Subramaniam, Shamala, Othman, Mohamed, Ahmad Zulkarnain, Zuriati

    Published 2008
    “…The aim of the discrete simulation framework is to deal with issues of the next generation of wireless cellular networks (e.g., multimedia traffic, radio resource management and mobility... etc) and to provide a platform for current and future investigations involving wireless cellular networks. …”
    Get full text
    Get full text
    Article
  11. 11

    Cross layer design in 802.16d by Al-Hemyari, Ali, Qassem, Y. A., Ng, Chee Kyun, Noordin, Nor Kamariah, Ismail, Alyani, Khatun, Sabira

    Published 2009
    “…It has high-speed data rate for large spanning area and is the key topology for the next generation wireless networking. The WIMAX mesh network (WMN) is developed with the use of base station (BS) as the main controller. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Modelling of geometric correction and relative radiometric normalization for near equatorial earth observation satellite images by Al-Razzaq Abd, Hayder Abd

    Published 2015
    “…Automatic control point extraction is then performed to generate control points automatically. The generated control points are refined by using the sum of absolute difference algorithm (SAD), with the help of an empirical threshold and control point locations to avoid obtaining inaccurate control points. …”
    Get full text
    Get full text
    Thesis