Search Results - (( data detection method algorithm ) OR ( data selection path algorithm ))
Search alternatives:
- method algorithm »
- data detection »
- data selection »
- selection path »
- path algorithm »
-
1
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…Finally, the algorithm Void Avoidance Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with the communication void by introducing a simple method to detect a void node and avoid it during the forwarding process. …”
Get full text
Get full text
Thesis -
2
Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel
Published 2016“…Results show that the defect detection algorithm able to detect defect only on the scratch area and able to read the Ga value at detected scratch line and transform it to surface roughness measurement at considerably good level of accuracy compared with manual method. …”
Get full text
Get full text
Thesis -
3
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
4
A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces
Published 2024“…Moreover, Cross-Stage Partial (CSP) DarkNet53 is used to improve the feature extraction and to facilitate the model’s object detection ability. A data augmentation algorithm is used for feature generation to enhance the model’s training robustness. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Totally opportunistic routing algorithm for underwater wireless sensor network
Published 2019“…Whereas in NA-TORA, Expected Transmission Count (ETX) and residual energy of a node are considered for data transmission to ensure packet delivery. The suggested data forwarding algorithms are designed to abstain horizontal transmission, to lower end to end delay and improve throughput and energy efficiency. …”
Get full text
Get full text
Thesis -
7
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
Published 2024“…PMTRF modules and their algorithms enable the isolation of the maintenance switch and the selection of the most reliable path for future affected flows based on input time provided by the administrator. …”
Get full text
Get full text
Get full text
Thesis -
8
Automated path testing using the negative selection algorithm
Published 2017“…Negative selection algorithm (NSA) has been used in this paper to generate test data for path testing automatically. …”
Get full text
Get full text
Indexed Article -
9
Effect of LiDAR mounting parameters and speed on HDL graph SLAM-Based 3D mapping for autonomous vehicles
Published 2025“…This study investigates the physical calibration of a LiDAR sensor mounted on a moving vehicle and its effect on 3D map generation using the HDL Graph SLAM algorithm. HDL Graph SLAM was selected as the offline post-processing method due to its self-correcting functions for estimating and auto-correcting positional errors from LiDAR data. …”
Get full text
Get full text
Get full text
Article -
10
Imaging of solid flow in a gravity flow rig using infra-red tomography
Published 2005“…The software development involves data acquisition system, sensor modeling, image algorithms, and programming for a tomographic display to provide solids flow information in pipeline such as concentration and velocity profiles. …”
Get full text
Get full text
Thesis -
11
-
12
An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network
Published 2019“…When this happens, the sensor node cannot receive and send the data until the energy is renewed. To reduce WSN energy consumption, the process of selecting a path to the destination is very important. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Such an in-band probing algorithm reduces measurement overhead on the selected overlay path. …”
Get full text
Get full text
Thesis -
14
Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria
Published 2018“…Dijkstra’s Algorithm is a shortest path algorithm that considers a single criterion only. …”
Get full text
Get full text
Get full text
Article -
15
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
16
Multi agent quality of service routing based on scheme ant colony optimization algorithm
Published 2014“…This study also introduces a new probe-based procedure for discovery and setup QoS path for real-time traffic. The proposed scheme has been simulated by OMNET++ and compared with standard AntNet and two well-known standard QoS routings; Widest Shortest Path (WSP) algorithm and Shortest Widest Path (SWP) algorithm. …”
Get full text
Get full text
Thesis -
17
Predetermined path of mobile data gathering in wireless sensor networks based on network layout
Published 2014“…Thus, within each of these divided areas, the multi-hop collection is deployed as a sub-set to the main collection. The ME will select a centroid point between two sub-polling points, subsequently selecting common turning points as the core of the basis of the tour path. …”
Get full text
Get full text
Article -
18
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis
