Search Results - (( mode selection path algorithm ) OR ( using codification using algorithm ))
Search alternatives:
- using codification »
- codification using »
- using algorithm »
- mode selection »
- selection path »
- path algorithm »
-
1
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…Attack paths that satisfy certain optimization criteria are then selected and presented as possible components of the security solution. …”
Get full text
Get full text
Article -
2
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…Attack paths that satisfy certain optimization criteria are then selected and presented as possible components of the security solution. …”
Get full text
Get full text
Article -
3
A Mininet emulation study for SDN fat tree data center sleep mode routing algorithms
Published 2025“…In this work meta heuristic algorithm is incorporated at the SDN central controller in a fat tree-based data centre for bandwidth usage monitoring, sleep decisions and path selection using Mininet emulation. …”
Article -
4
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The system is then used in path prediction mode for reconstructing the missing parts of the trajectory when actual positioning data is unavailable. …”
Get full text
Get full text
Thesis -
5
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2017“…MicroNIR was set up in two different scan modes to study the effect of path length to the performance of spectral measurement. …”
Get full text
Get full text
Get full text
Article -
6
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
7
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2024“…MicroNIR was set up in two different scan modes to study the effect of path length to the performance of spectral measurement. …”
Article -
8
An Energy-Efficient Cross-Layer approach for cloud wireless green communications
Published 2017“…More precisely, network layer could utilize the MAC layer and physical layer information to establish an energy efficient route path to be used in forwarding data. The proposed EECL approach uses X-MAC protocol in support of duty cycle which introduces short preambles that switches to wake-up/sensing mode only for nodes belonging to routing path while the other nodes set to be in sleep mode. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Levy slime mould algorithm for solving numerical and engineering optimization problems
Published 2022“…The SMA is a newly developed metaheuristic algorithm that is inspired by the slime moulds natural oscillation mode. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
LED based NIR spectroscopy for detection of lard adulteration in palm oil via chemometrics / Katrul Nadia Basri
Published 2017“…MicroNIR was set up in two different scan modes to study the effect of path length to the performance of spectral measurement. …”
Get full text
Get full text
Thesis -
11
GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks
Published 2014“…The Greedy Forwarding Strategy (GFS) has been the most used strategy in position-based routing protocols. The GFS algorithm was designed as a high-performance protocol that adopts hop count in soliciting shortest path. …”
Get full text
Get full text
Get full text
Thesis -
12
Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks
Published 2022“…Also, implementing all GCLs in the selected path based on TT evaluations without considering their impacts on the AVB performance results in improper scheduling designs. …”
Get full text
Get full text
Thesis -
13
Load balancing and congestion control in ATM using fuzzy logic and spiking neuron network / Tan Jiann Shin
Published 2005“…The proposed intelligent routing algorithm, integrates spiking neuron network with fuzzy link cost for the dynamic routing computation. …”
Get full text
Get full text
Thesis -
14
Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani
Published 2015“…In case of multiple filterbanks the cepstral features are used in different experts for performing classification based on different representation of speeches. …”
Get full text
Get full text
Thesis
