Search Results - (( data estimation using algorithm ) OR ( peer evaluation path algorithm ))
Search alternatives:
- data estimation »
- using algorithm »
- peer evaluation »
- evaluation path »
- path algorithm »
-
1
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Several experiments were carried out using the OMNeT++ simulation framework. The designed algorithm was evaluated using experimental data. …”
Get full text
Get full text
Thesis -
2
Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET
Published 2022“…This scheme selects genuine node for routing path production, by using the node reward with dependence level estimating algorithm to compute every node trust level and resource range, to disconnect higher trust level node and lower trust level node; higher trust level node is a genuine node which performs secure communication. …”
Get full text
Get full text
Article -
3
Accurate range free localization in multi-hop wireless sensor networks
Published 2019“…Finally, the GMSDP- algorithm achieves and provides a better value of RMSEs and the greatest localization estimation errors comparing with the CRLR algorithm and WLS algorithm.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Genetic algorithm for control and optimisation of exothermic batch process
Published 2013“…In general, most of the studies use predictive approach to estimate the process behaviour and a slave controller, usually proportional-integral-derivative (PID), is employed to control the process based on the estimated plant behaviour. …”
Get full text
Get full text
Get full text
Thesis -
5
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…Firstly, an improved EM (IEM) algorithm is presented to estimate the five parameters of the single PV-module system. …”
Get full text
Get full text
Thesis -
6
-
7
Embedded Dual Band Rfid Based Blood Glucose Monitoring System For Internet Of Medical Things
Published 2020“…These two parameters are then taken into account in experimental setup for performance evaluation of the enhanced CSMA/CA (EN-CSMA/CA) algorithm that uses an external interrupt mechanism and a cross layer approach. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
-
11
Quantitative and qualitative analysis of unmanned aerial vehicle's path planning using master-slave parallel vector-evaluated genetic algorithm
Published 2012Get full text
Citation Index Journal -
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20
Image orientation watermarking technique for copyright protection
Published 2016“…In the Pre-Protection design, it investigates the proofing on image operation corruption to support the principle used in showing the preliminary impact of data corruption made by resizing. …”
Get full text
Get full text
Get full text
Thesis
