Search Results - intelligence valid ((protocol algorithm) OR (path algorithm))
Search alternatives:
- intelligence valid »
- protocol algorithm »
- path algorithm »
-
1
Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques
Published 2024“…By contrast, the results of the safe path selection model were compared with the results obtained using Dijkstra's algorithm and the Floyd-Warshall algorithm. …”
thesis::doctoral thesis -
2
Cohesive token passing algorithm utilizing software agents
Published 2010“…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
Get full text
Get full text
Article -
3
A novel Bezier curve control point search algorithm for autonomous navigation using N-order polynomial search with boundary conditions
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Intelligent guidance parking system using modified Dijkstra's algorithm
Published 2014“…This paper presents the intelligent parking system which apply Dijkstra’s algorithm in finding the shortest path. …”
Get full text
Get full text
Get full text
Article -
5
Design of Modeling Elements of Luoshan Shadow Puppets Creative Goods Based on Deep Learning
Published 2023“…The results show that the F1 value of the algorithm is about 94%, and the efficiency of the algorithm is high. …”
Get full text
Get full text
Get full text
Proceeding -
6
The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed
Published 2024“…Due to network complexity, conventional QoS-improving routing algorithms (RAs) may be impractical. Thus, researchers are developing intelligent RAs, including machine learning (ML)-based algorithms to meet traffic Q oS r equirements. …”
Conference Paper -
7
-
8
Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih
Published 2019“…Since Constraint Satisfaction Problem (CSP) is an NP-complete problem, brute-force search algorithms such as Backtracking algorithm (BT) are required as the guarantee to find a solution, when there is one. …”
Get full text
Get full text
Thesis -
9
-
10
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
Get full text
Get full text
Thesis -
11
Optimization And Execution Of Multiple Holes-Drilling Operations Based On STEP-NC
Published 2021“…Optimization of tool path operation can lead to a significant reduction in non-productive machining time. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network
Published 2016“…The validity of the proposed algorithm is investigated by its comparison with ARP-QD protocol, which works on the mechanism of optimal route finding in VANETs in urban environments. …”
Get full text
Get full text
Article -
13
-
14
Distributed planning and control of multirobot formations with navigation and obstacle avoidance
Published 2011Get full text
Get full text
Conference or Workshop Item -
15
Ant-based vehicle congestion avoidance framework using vehicular networks / Mohammad Reza Jabbarpour Sattari
Published 2015“…Previous researches concentrated on using static algorithms to find the shortest path in VTRSs. However, providing a shortest path without considering other factors such as congestion, accidents, obstacles, travel time and speed is not a proper solution for vehicle traffic congestion problem. …”
Get full text
Get full text
Thesis -
16
Routing based multi-agent system for network reliability in the smart microgrid
Published 2020“…In this paper, the focus is to enhance the intelligence of microgrid networks using a multi-agent system while validation is carried out using network performance metrics i.e., delay, throughput, jitter, and queuing. …”
Get full text
Get full text
Article -
17
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
Get full text
Get full text
Get full text
Article -
18
Energy-efficient data transmission with clustering and compressive sensing in wireless sensor networks / Mukil Alagirisamy
Published 2020“…Residual energy of POR is 0.26 times higher and PRMTI is 0.14 times higher than the existing protocol. The simulation results of clustering algorithms, INACS and Perceptron framework are validated using various data analysis methods. …”
Get full text
Get full text
Get full text
Thesis -
19
A systematic literature review on the application of artificial intelligence in enhancing care for kidney diseases patients
Published 2024“…It requires early detection for management. Artificial Intelligence (AI) has emerged as a transformative tool in the management of CKD, enabling more precise diagnosis, treatment optimization, and long-term care. …”
Get full text
Get full text
Get full text
Article -
20
