Search Results - (( rate estimation path algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- data normalization »
- rate estimation »
- estimation path »
- path algorithm »
- java »
-
1
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Active measurement techniques performed by overlay nodes can provide bandwidth estimations of an end-to-end overlay path. This thesis describes a new algorithm called “COPPA,” which is an in-band path probing algorithm for measuring the end-to-end available bandwidth of an overlay path accurately and continuously. …”
Get full text
Get full text
Thesis -
2
Identification and mitigation of non-line-of-sight path effect using repeater for hybrid ultra-wideband positioning and networking system
Published 2021“…Although UWB positioning offers precise locality tracking, the accuracy of the estimation is greatly affected by the non-line-of-sight (NLOS) path effect. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
4
Coordinate-Descent Adaptation over Hamiltonian Multi-Agent Networks
Published 2021“…To implement the ILMS algorithm, each node needs to receive the local estimate of the previous node on the cycle path to update its own local estimate. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET
Published 2022“…This scheme selects genuine node for routing path production, by using the node reward with dependence level estimating algorithm to compute every node trust level and resource range, to disconnect higher trust level node and lower trust level node; higher trust level node is a genuine node which performs secure communication. …”
Get full text
Get full text
Article -
6
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
7
Development of low power viterbi decoder on complex programmable logic device platform
Published 2018“…For the path metric updater unit (PMU), the traditional method of Viterbi algorithm is to store the selected minimum value of branch metric in the memory unit. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Performance Enhancement Of Ultra-Wideband Power Control Using Ranging And Narrowband Interference Mitigation
Published 2008“…In this thesis we propose a maximum likelihood algorithm enhanced with synchronization scheme to estimate the time delay of direct-path signal in NLOS multi-path fading environment and mean acquisition time. …”
Get full text
Get full text
Thesis -
10
-
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
12
Visual servo algorithm of robot arm simulation for dynamic tracking and grasping application
Published 2022“…Future works are required to improve the dynamic visual servo algorithm with motion planning when obstacles are present in the path of robot grasping.…”
Get full text
Get full text
Get full text
Article -
13
Composite nonlinear feedback control with multi-objective particle swarm optimization for active front steering system
Published 2024journal::journal article -
14
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…The idea of multiple antennas at the transmitter and receiver has introduced multiple-input multiple-output (MIMO) system, which increases robustness to the effect of multi-path fading provides higher data rates without consuming extra bandwidth and power. …”
Get full text
Get full text
Thesis -
15
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
16
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…A new mutation vector inspired by the two-opposite path (2-Opt) algorithm with adaptive mutation scalar (F ) and crossover rate (CR) control parameters were employed to enhance the exploration and exploitation phases of the proposed algorithm. …”
Get full text
Get full text
Thesis -
17
Channel Modeling and Direction-of-Arrival Estimation in Mobile Multiple-Antenna Communication Systems
Published 2005“…Low-complexity spectral-based estimators are used for the estimation of direction and spatial spread of the distributed source by employing the proposed channel model for simulation. …”
Get full text
Get full text
Thesis -
18
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System
Published 2008“…A good agreement between the simulated and observed data was achieved for rating curves with RMSE = 0.96, 0.94, 0.95, and 0.97 at respective calibration points. …”
Get full text
Get full text
Thesis
