Search Results - (( based realization path algorithm ) OR ( rate information sharing algorithm ))*

Refine Results
  1. 1

    Nonlinear FXLMS algorithm for active noise control systems with saturation nonlinearity by Sahib, Mouayad A., Raja Ahmad, Raja Mohd Kamil, Marhaban, Mohammad Hamiruce

    Published 2012
    “…Simulation results show that the performance of the THF-based NLFXLMS algorithm is comparable with the SEF-based NLFXLMS.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Adaptable decentralized orchestration engine for block structured non-transactional workflow in service oriented architecture. by Esfahani, Faramarz Safi

    Published 2011
    “…The latter considers the frequent-path adaptability and both of them together satisfy both frequent-path and proportionalfragment adaptability aspects; v) A Fuzzy Decentralization Decision Making algorithm (FDDM) is presented based on the fuzzy logic to choose a suitable method of decentralization that satisfies the three adaptability aspects frequent-path,proportional- fragment and available-bandwidth; and, vi) an algorithm is introduced for wiring of dynamic fragments. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems by Abdulhussein, Mohanad Mohammed

    Published 2021
    “…To solve this problem, a new cooperative NOMA system is introduced, in which we first, propose a receiver equalizer at weak user known as weak user beam-matching (WBM) equalizer based on deviceto- device (D2D) channel state information (CSI) sharing between the nearby strong and weak users. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose by Azizan, Anis Natasha

    Published 2019
    “…Therefore, controller is used for navigation before and after approaching obstacles. Path planning algorithm in this project provides the best path to avoid the obstacle and create temporary new waypoints within split seconds. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks by Barjini, Hassan

    Published 2012
    “…Thus, the proposed algorithms enhance the performance of the search by reducing redundant messages, increasing the success rate and decreasing latency. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Implementation of motion planning and active force control to a virtual wheeled mobile robot by Tang, Howe Hing

    Published 2004
    “…The developed simulator may serve as a virtual testbed for the repetitive experimentation of the proposed mobile robot control scheme within a specified workspace or layout. The motion path planning is based on the A*heuristic search algorithm with a specific reference to the sixelementary jumps graph for the generation of a nonholonomic global collision-free path environment. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Algebraic Net Class Rewriting Systems, Syntax and Semantics for Knowledge Representation and Automated Problem Solving by Tirri, Seppo Ilari

    Published 2013
    “…The intention of the present study is to establish general framework for automated problem solving by approaching the task universal algebraically introducing knowledge as realizations of generalized free algebra based nets, graphs with gluing forms connecting in- and out-edges to nodes. …”
    Get full text
    Get full text
    Journal
  11. 11

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Therefore, in order to improve bandwidth fairness along with efficient optimization to alleviate this problem, we propose two marker algorithms; a Double Modified Double Improved time sliding window Three Colour Marker (M2I2TSWTCM) algorithm, which makes a new value of that depends on the logarithm peak information rate (PIR) and which is added to the adaptive factor that exists in the previous algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Several experiments were carried out using the OMNeT++ simulation framework. The designed algorithm was evaluated using experimental data. The obtained results show that the continuous in-band overlay path probing algorithm (COPPA) provides up-to-date bandwidth information with reduced overhead and minimal impact on the traffic of the path.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Performance evaluation of task scheduling using hybrid meta-heuristic in the heterogeneous cloud environment by Mohammed, Faten Ameen Saif

    Published 2019
    “…Cloud computing is a platform in which it provides services, information and software over the Internet. The essential role of cloud computing is enabling sharing of resources on-demand over the network (e.g. servers, applications, storage, services and database) to the end-users that are distributed geographically. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid by Abd Hamid, Syazwina

    Published 2020
    “…Besides that, the text in reviews convey better information than the rating alone thus encourages deeper study on the review content. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh by Mohammed Saleh, Mohammed Ahmed

    Published 2016
    “…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The algorithm achieved an average of 87% precision, 83% of recall, 85% of F-score and 82% of accuracy rate.…”
    Get full text
    Get full text
    Thesis
  19. 19

    A study on personalized recommender system using social media by Aishnivya, Balamurugan

    Published 2020
    “…These machine learning algorithm processes the data set obtained. The evaluation on these algorithm is done to evaluate accuracy of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2020
    “…This proposed study describes the steps of digital signal processing on electrocardiogram (ECG) and the security of the ECG signal by using Fully Homomorphic Encryption (FHE). Sharing the patient’s information through the Internet of Thing (IoT) for faster diagnosis has security and privacy issues. …”
    Get full text
    Get full text
    Article