Search Results - (( java implication based algorithm ) OR ( using association path algorithm ))
Search alternatives:
- implication based »
- using association »
- java implication »
- association path »
- path algorithm »
-
1
Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control
Published 2016“…However, this assumption may lead to inaccurate secondary path model. In this work, the modelling of acoustic path using FIR filters is incorporated for both algorithms for Wiener-Hammerstein structure. …”
Get full text
Get full text
Thesis -
2
Implementation of Graph Based Path Planning Algorithms on a Mobile Robot in a Confined Site
Published 2017“…This project investigates the performance of three different graph based path planning algorithms used, relaxed A*, A* and Dijkstra’s algorithm in a few environments with different obstacles settings using Gazebo environment simulator and Turtlebot simulator (computer simulation) and 4WD navigation robot (real environment simulation).…”
Get full text
Get full text
Final Year Project -
3
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…The methodology is proposed as stacking ensemble ML and the best ML algorithms are used as a base learner to compute relative feature weights. …”
Get full text
Get full text
Thesis -
4
-
5
Associated Factors of Cardiovascular Diseases in Pakistan: Assessment of Path Analyses Using Warp Partial Least Squares Estimation
Published 2020“…Warp partial least squares (PLS) based on warp 3 algorithm was used to estimate the simultaneous linear and non-linear path coefficients of the proposed model of study. …”
Get full text
Get full text
Get full text
Article -
6
Path recovery mechanism in 6LoWPAN routing
Published 2010“…Hierarchical routing (HiLow) algorithm that uses dynamically assigned 16-bit unique short address as its interface identifier has an advantage of memory saving. …”
Get full text
Get full text
Conference or Workshop Item -
7
Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
Published 2020“…Two algorithms are proposed, utilizing single-path and multipath in transmission flow. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
Workload performance evaluation of large spatial database for DSS based disaster management
Published 2017“…Data recorded in the shortest path analysis process reveals that the evaluation and the prediction on workload performance of shortest path analysis using Dijkstra algorithm has been well implemented. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks
Published 1999“…Using simulation now validates this statement. (5) The computation error of a project likelihood completion date is less than 10 percent if a path of a float greater than twice the larger standard deviation of this mentioned path and the critical path is dropped from the calculation, and (6) An effective risk response framework is introduced to help contractors systematically manage the risk in scheduling their projects.…”
Get full text
Get full text
Thesis -
11
Suicide and self-harm prediction based on social media data using machine learning algorithms
Published 2023“…In combined with robust machine learning algorithms, social networking data may provide a potential path ahead. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Machine Learning-Enabled Communication Approach for the Internet of Medical Things
Published 2023“…Additionally, other evaluation metrics are used to find a reliable and shortest possible communication path between the two interested parties. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
A smart guidance indoor parking system based on Dijkstra's algorithm and ant colony algorithm
Published 2020“…The hardware part explains the components used in the system and the software part explains the algorithms which have been used in the system. …”
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
18
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In comparison to the standard bioinspired algorithms and existing secure routing protocols, the proposed system reduces average energy consumption by nearly 50% regardless of the increase in the number of nodes and end-to-end delay of 40%, while finding the secure and optimal path in unison is designed to ensure trust in the IoT environment.…”
Get full text
Get full text
Get full text
Get full text
Article -
19
A Study of Visual Attention in Diagnosing Cerebellar Tumours
Published 2009“…This experiment involves three participants for examining 20 MRS graphs to estimate the peaks of chemical quantities which indicate the abnormalities associated with Cerebellar Tumours (CT). The status of each MRS is verified by using decision algorithm. …”
Get full text
Get full text
Article -
20
A Mininet emulation study for SDN fat tree data center sleep mode routing algorithms
Published 2025“…In this work meta heuristic algorithm is incorporated at the SDN central controller in a fat tree-based data centre for bandwidth usage monitoring, sleep decisions and path selection using Mininet emulation. …”
Article
