Search Results - (( using simulation table algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- simulation table »
- java implication »
- implication tree »
- table algorithm »
- tree algorithm »
-
1
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
Published 2008“…The performance analysis of the proposed algorithms was conducted by using the discrete-event simulator, OMNeT++. …”
Get full text
Get full text
Thesis -
2
Power Delivery Network Modeling And Simulation By Using Delaunay-Voronoi Triangulation And The Latency Insertion Method
Published 2018“…The research is focused into the analysis of PDN by modeling and simulation of the power plane. In the project, power plane is modeled using Delaunay-Voronoi algorithm and for simulation, a fast transient simulation algorithm which is latency insertion method (LIM) is applied. …”
Get full text
Get full text
Monograph -
3
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…Secondly is to design a new control strategy that will provide good tracking performance of the XY table. The final objective is to validate the proposed technique through simulation using MATLAB/Simulink software and experimental work using real plant of Googoltech XY table. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Simulation of identifying shortest path walkway in library by using ant colony optimization
Published 2012Get full text
Get full text
Undergraduates Project Papers -
5
Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki
Published 2014“…Water table modelling based on ANNs and ANFIS technology were developed to simulate the water table fluctuations based on the relationship between the variations of rainfall, humidity, evaporation, minimum and maximum temperature and water table depth. …”
Get full text
Get full text
Thesis -
6
OPTIMIZATION OFADVANCEDENCRYPTION STANDARD (AES) IN FPGA IMPLEMENTATION USING S-BOX INTEGRATION
Published 2004“…Thus, in this project, the AES cryptograph was simulated with FPGA, by using Verilog HDL. The main objectives are the architectural and algorithmic optimizations of the AES implementation, which would in turn benefit applications that are both speed and area critical. …”
Get full text
Get full text
Final Year Project -
7
A multiobjective simulated Kalman filter optimization algorithm
Published 2018“…It is a further enhancement of a single-objective Simulated Kalman Filter (SKF) optimization algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Resource management in grid computing using enhanced ant colony optimization
Published 2010“…Simulation approach has been used to test the performance of the algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
9
Load balancing using enhanced ant algorithm in grid computing
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
10
An adaptive relay selection scheme for enhancing network stability in VANETs
Published 2020“…Moreover, the network scalability is enhanced by adaptively selecting most sustainable paths based on a signal strength beacon and the mobility degree of a node, which reduces significantly minimizes the size of control messages overhead as well the routing tables recalculation process. Simulation experiments using the network simulator are presented to demonstrate the effectiveness of our solution. …”
Get full text
Get full text
Get full text
Article -
11
Ant colony algorithm for job scheduling in grid computing
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Dynamic obstacle handling in multi-robot coverage
Published 2024“…It then generates a new avoidance velocity for robots, enabling them to avoid dynamic obstacles while achieving complete coverage. The simulations were conducted by using MATLAB to demonstrate the superiority of Modified Lloyd’s algorithm with VO over existing Lloyd’s algorithm in terms of average of total number of collisions between robots and dynamic obstacle during coverage task. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys
Published 2014“…Substitution table or S-Box is the major core of AES algorithm and it is used to provide confusion capability for AES. …”
Get full text
Get full text
Conference or Workshop Item -
14
Natural gas liquid (NGL) distillation process using driving force and thermal pinch analysis methods: Energy and economic assessment / Munawar Zaman Shahruddin ... [et al.]
Published 2020“…Then, the extracted data from the simulation will be used for thermal pinch analysis via problem table algorithm (PTA). …”
Get full text
Get full text
Article -
15
Modelling of multi-robot system for search and rescue
Published 2023“…The simulations conducted using MATLAB demonstrate the superiority of the MPSO algorithm over the PSO algorithm in terms of average path length and execution time of all robots in all three proposed scenarios: 16 meter shorter and 7.1 seconds faster in the first scenario, 17.89 meters shorter and 6.14 seconds faster in scenario 2, and 6.18 meters shorter and 8.47 seconds faster in scenario 3. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Automated Model Generation Approach Using MATLAB
Published 2011“…The aim of the chapter is to introduce a self-tuning algorithm (i.e., AMG) using MATLAB for automated analogue circuit modelling suitable for HLM and HLFM applications. …”
Get full text
Get full text
Get full text
Book Section -
17
A New Proposed Pendulum-Like with Attraction-Repulsion mechanism Algorithm for Solving Optimization Problems
Published 2023“…Comparisons between the suggested PA with the available algorithms, such as genetic algorithm (GA) and EM were conducted using two mathematical test functions. …”
Conference Paper -
18
Protection of integrity and ownership of pdf documents using invisible signature
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
19
Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm
Published 2006“…In the first method, the fuzzy reasoning is used to estimate the time route can stay active in the routing table. …”
Get full text
Get full text
Thesis -
20
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
Published 2011“…The analytical results for link throughput and average delay were used to validate the simulated results.…”
Get full text
Get full text
Thesis
