Search Results - (( java implication based algorithm ) OR ( next generation path algorithm ))
Search alternatives:
- implication based »
- java implication »
- generation path »
- path algorithm »
-
1
Optimised multi-robot path planning via smooth trajectory generation
Published 2024“…A MPSO algorithm, without path smoothening, is used for comparison. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The mean path cost generated by the LS algorithm, on the other hand, is 14% higher than that generated by the PRM. …”
Get full text
Thesis -
3
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…Bresenham Line Algorithm is a line generation algorithm using integer arithmetic where the points (x1, y1) and (x2, y2) are assumed not equal and integer valued. …”
Get full text
Get full text
Get full text
Thesis -
4
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…The next-generation cyber defense that relies on predictive analysis is more proactive than existing technologies that rely on intrusion detection. …”
Get full text
Get full text
Get full text
Article -
6
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…The attack surface for hackers is growing as more devices are linked to the internet. The next generation cyber defence concentrating on predictive analysis seems more proactive than existing technologies based on intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
A coverage path planning approach for autonomous radiation mapping with a mobile robot
Published 2023Article -
8
Fair and fit resource allocation algorithm for network-controlled device-to-device (D2D) communication / Yusmardiah Yusuf, Darmawaty Mohd. Ali and Roslina Mohamad
Published 2021“…In this paper, a Fair and Fit Resource Allocation (FFRA) algorithm is proposed which exploits the path loss experienced by the potential D2D user equipments (UEs) when choosing the communication path. …”
Get full text
Get full text
Get full text
Article -
9
Improvement of Centralized Routing and Scheduling Using Cross-Layer Design and Multi-Slot Assignment in Wimax Mesh Networks
Published 2009“…This thesis also proposes a centralized scheduling algorithm that can avoid the collision by constructing routing path with multi-slot single transceiver system for WiMAX mesh networks. …”
Get full text
Get full text
Thesis -
10
Discrete simulation framework for wireless cellular networks.
Published 2008“…The aim of the discrete simulation framework is to deal with issues of the next generation of wireless cellular networks (e.g., multimedia traffic, radio resource management and mobility... etc) and to provide a platform for current and future investigations involving wireless cellular networks. …”
Get full text
Get full text
Article -
11
Cross layer design in 802.16d
Published 2009“…It has high-speed data rate for large spanning area and is the key topology for the next generation wireless networking. The WIMAX mesh network (WMN) is developed with the use of base station (BS) as the main controller. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques
Published 2021“…Finally, DTM that has been generated in this research compared by DTM that was created manually. …”
Get full text
Get full text
Get full text
Thesis -
14
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
15
-
16
Modelling of geometric correction and relative radiometric normalization for near equatorial earth observation satellite images
Published 2015“…Automatic control point extraction is then performed to generate control points automatically. The generated control points are refined by using the sum of absolute difference algorithm (SAD), with the help of an empirical threshold and control point locations to avoid obtaining inaccurate control points. …”
Get full text
Get full text
Thesis
