Search Results - (( simulation mitigation clustering algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- simulation mitigation »
- java application »
-
1
Data-driven dynamic clustering framework for mitigating the adverse economic impact of Covid-19 lockdown practices
Published 2020“…Through an intelligent fusion of healthcare and simulated mobility data, we model lockdown as a clustering problem and design a dynamic clustering algorithm for localized lockdown by taking into account the pandemic, economic and mobility aspects. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours
Published 2024“…Thus, this research proposes enhancement on clustering algorithm to mitigate the impact of correlated node behaviour on network performances. …”
thesis::doctoral thesis -
4
Data redundancy reduction scheme for data aggregation in wireless sensor network
Published 2020“…Network simulator OMNeT++ is used to simulate DRRS and it is evaluated with Low-Energy Adaptive Clustering Hierarchy (LEACH), Redundancy elimination Energy-Efficient Routing Protocol (REERP) and Fault-Tolerant Data Aggregation (FTDA). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
5
An efficient up-link load reduction model based on clustering in vanets
Published 2019“…This study proposed an Efficient Up-link Load Reduction (EULR) model to mitigate the uplink load at BSs. EULR model consisted of three parts: the first part, two novel algorithms Smart CH Election (SCHE) and Hybrid Cluster-Head Election (HCHE) to increase cluster stability and reduce the number of CHs changes in the network by selecting the best vehicle as cluster head (CH) based on two dynamic thresholds. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
7
Power management system for smart microgrid considering meteorological and load demand data / Sam Koohikamali
Published 2015“…Microgrid refers to a cluster of generation, load, and energy storage units which can operate in grid-connected and/or in islanded modes. …”
Get full text
Get full text
Thesis -
8
Detection And Identification Of Stiction In Control Valves Based On Fuzzy Clustering Method
Published 2016“…This modification prevents the fuzzy clustering algorithm from turning into numerical problem. …”
Get full text
Get full text
Thesis -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
Published 2022“…In order to validate the competence of these proposed algorithms, results were compared with another similar research work known as DPRS algorithm. …”
Get full text
Get full text
Thesis
