Search Results - (( using evaluation path algorithm ) OR ( using function path algorithm ))
Search alternatives:
- using evaluation »
- evaluation path »
- path algorithm »
- using function »
- function path »
-
1
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Conference Paper -
2
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
Get full text
Get full text
Thesis -
3
All-pass filtered x least mean square algorithm for narrowband active noise control
Published 2018“…Recently several new ANC algorithms have been developed; in which there is no requirement for the modelling of the secondary path transfer function. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Nonlinear adaptive algorithm for active noise control with loudspeaker nonlinearity
Published 2014“…The proposed THF-NLFXLMS algorithm models the Wiener secondary path and applies the estimated degree of nonlinearity of the nonlinear secondary path in the control algorithm design. …”
Get full text
Get full text
Thesis -
5
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…A model-driven approach was used for generating abstract test cases from the feasible paths. …”
Get full text
Get full text
Get full text
Thesis -
6
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…The algorithms are evaluated using 30 benchmark functions of the CEC2014 benchmark suite, and then applied to solve PCB drill path optimization case study. …”
Get full text
Get full text
Thesis -
7
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…We describe our approach for implementing an optimized security assessment using Genetic Algorithm (GA). Because of the dynamic nature of an enterprise network, all security analysis tools devised for the network need to function in dynamic mode as well. …”
Get full text
Get full text
Article -
8
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…We describe our approach for implementing an optimized security assessment using Genetic Algorithm (GA). Because of the dynamic nature of an enterprise network, all security analysis tools devised for the network need to function in dynamic mode as well. …”
Get full text
Get full text
Article -
9
Nonlinear THF-FXLMS algorithm for active noise control with loudspeaker nonlinearity
Published 2016“…The proposed THF-NLFXLMS algorithm, models the nonlinear secondary path and applies the estimated degree of nonlinearity in the control algorithm design. …”
Get full text
Get full text
Get full text
Article -
10
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Levy slime mould algorithm for solving numerical and engineering optimization problems
Published 2022“…We took advantage of the Levy flight, which solved the local optima problem and improved traditional SMA efficiency. The proposed LSMA algorithm performance was evaluated using 23 well-known benchmark test functions, namely unimodal benchmark functions, multimodal benchmark functions, and fixed-dimension multimodal benchmark functions, as well as compared with the traditional SMA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
STITCH-256: A dedicated cryptographic hash function
Published 2023“…Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. …”
Article -
14
The Hybrid of WOABAT-IFDO Optimization Algorithm and Its Application in Crowd Evacuation Simulation
Published 2023“…The performance of the new hybrid optimization algorithm is verified using standard classical test function and further evaluated with other four renowned optimization algorithms and the results showed that it is better in most cases compared with the existing algorithms. …”
Get full text
Get full text
Get full text
Proceeding -
15
The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail
Published 2017“…This project use usability test for user testing system and functionality test to evaluate the efficiency of the game. …”
Get full text
Get full text
Thesis -
16
-
17
Improving Network Consistency and Data Availability Using Fuzzy C Mean Clustering Algorithm in Wireless Sensor Networks
Published 2024thesis::doctoral thesis -
18
Optimum Feeder Routing and Distribution Substation Placement and Sizing using PSO and MST
Published 2014“…This paper proposes an algorithm to find the optimum distribution substation placement and sizing by utilizing the PSO algorithm and optimum feeder routing using modified MST. …”
Get full text
Get full text
Article -
19
Performance evaluation of heuristic methods in solving symmetric travelling salesman problems
Published 2016“…Their performances were compared and the appropriate algorithm for solving TSPs was then identified. The solution quality was evaluated using empirical testing, benchmark solutions and probabilistic analyses. …”
Get full text
Get full text
Get full text
Article -
20
Development of a motion planning and obstacle avoidance algorithm using adaptive neuro fuzzy inference system for mobile robot navigation
Published 2017“…After this, the third objective of the research is planning in a crowded complex situation to evaluate the risk of collision between the robot and the obstacle’s trajectory using a fuzzy logic controller. …”
Get full text
Get full text
Get full text
Thesis
