Search Results - (( simulation optimization detection algorithm ) OR ( code application optimized algorithm ))
Search alternatives:
- optimization detection »
- optimized algorithm »
- code application »
-
1
A study on channel coding for 5G / Xu Wei
Published 2019“…The simulation results show that adding the outer code CRC allows the Polar code to perform error detection during the decoding process and optimize the performance of the polar code. …”
Get full text
Get full text
Get full text
Thesis -
2
Energy-Aware Routing Hole Detection Algorithm in the Hierarchical Wireless Sensor Network
Published 2019“…In this paper a novel energy efficient routing hole detection (EEHD) algorithm is presented, on the detection of routing hole, the periodic re-clustering is performed to avoid the long detour path. …”
Get full text
Get full text
Get full text
Article -
3
-
4
A NOVEL CONSTRUCTION OF VECTOR COMBINATORIAL (VC) CODE FAMILIES AND DETECTION SCHEME FOR SAC OCDMA SYSTEMS
Published 2010“…Secondly, a new detection technique based on exclusive-OR (XOR) logic is developed and compared to the reported detection techniques. …”
Get full text
Get full text
Thesis -
5
Robust multi-user detection based on hybrid grey wolf optimization
Published 2020“…The simulation results show that the iteration times of the multi-user detector based on the proposed algorithm is less than that of genetic algorithm, differential evolution algorithm and Grey wolf optimization algorithm, and has the lower BER.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
6
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The results demonstrated that the proposed method could generate an optimal collision-free path. Moreover, the proposed algorithm result are compared to some common algorithms such as the A* algorithm, Probabilistic Road Map, RRT, Bi-directional RRT, and Laser Simulator algorithm to demonstrate its effectiveness. …”
Get full text
Thesis -
7
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Distance approximation using pivot point in narrow phase collision detection
Published 2013“…Thus, an algorithm for the optimal distance computation algorithm for continuous collision detection is shown in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
10
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
Get full text
Get full text
Thesis -
11
Methane plume localization with enhanced self-best reduction and Gaussian improved particle swarm optimization (GiPSO)
Published 2024“…Adapting the Gaussian gas plume model in the simulation provides the experiment with a realistic optimization problem for GiPSO to optimize in the simulation, where we can test the engagement of dynamically challenging optimization problems such as gas plume dispersions. …”
Get full text
Get full text
Thesis -
12
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
A noble approach of ACO algorithm for WSN
Published 2018“…The proposed algorithm has been simulated and verified utilizing MATLAB and the simulation results demonstrate that new ant colony optimization based algorithm can achieve better performance and faster convergence to determine the best cost route.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Joint optimal detection of ordering SIC ZF and SIC ZF MAP for V-BLAST/STBC wireless communication systems
Published 2008Get full text
Conference or Workshop Item -
16
Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
17
Neural network algorithm-based fall detection modelling
Published 2020“…Related algorithm for the fall detection has been discussed in depth by researcher from the previous research. …”
Get full text
Get full text
Get full text
Article -
18
-
19
A review of crossover methods and problem representation of genetic algorithm in recent engineering applications
Published 2020“…High efficiency of crossover operators enables minimizing the error occurred in engineering application optimization within a short time and cost. …”
Get full text
Get full text
Get full text
Article -
20
Cyber Terrorist Detection by using Integration of Krill Herd and Simulated Annealing Algorithms
Published 2024“…This paper presents a technique to detect cyber terrorists suspected activities over the net by integrating the Krill Herd and Simulated Annealing algorithms. …”
Article
