Search Results - (( data virtualization based algorithm ) OR ( data estimation path algorithm ))
Search alternatives:
- virtualization based »
- data virtualization »
- data estimation »
- estimation path »
- path algorithm »
-
1
Intruder localization wireless sensor network radar design with virtual reference tags
Published 2014“…This research designs a WSN (Wireless Sensor Network) algorithm for human intruder localization and path detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Active measurement techniques performed by overlay nodes can provide bandwidth estimations of an end-to-end overlay path. This thesis describes a new algorithm called “COPPA,” which is an in-band path probing algorithm for measuring the end-to-end available bandwidth of an overlay path accurately and continuously. …”
Get full text
Get full text
Thesis -
3
Delay-based load-balancing routing (DLBR) algorithm for wireless ad-hoc networks
Published 2015“…The DLBR then uses this metric to select high capacity links for data forwarding, thus providing paths with less congested nodes and high capacity links. …”
Get full text
Get full text
Conference or Workshop Item -
4
Delay-based load-balancing routing (DLBR) algorithm for wireless ad-hoc networks
Published 2015“…The DLBR then uses this metric to select high capacity links for data forwarding, thus providing paths with less congested nodes and high capacity links. …”
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…Based on the proposed algorithms, energy consumption can be reduced…”
Get full text
Get full text
Get full text
Article -
7
Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET
Published 2022“…This scheme selects genuine node for routing path production, by using the node reward with dependence level estimating algorithm to compute every node trust level and resource range, to disconnect higher trust level node and lower trust level node; higher trust level node is a genuine node which performs secure communication. …”
Get full text
Get full text
Article -
8
Identification and mitigation of non-line-of-sight path effect using repeater for hybrid ultra-wideband positioning and networking system
Published 2021“…In conclusion, the proposed method is capable of mitigating the NLOS path effect on both indoor positioning and data networking systems.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…The proposed HBAC algorithm was tested and compared with other stateof-the-art algorithms on 200 to 2000 even tasks by using CloudSim on standard workload format (SWF) data sets file size (200kb and 400kb). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
A network aware based recommender system for VOIP application service in eLearning environment / Nazdiana Ab. Wahab
Published 2009“…Pathload has been chosen as a measurement tool that estimates the available bandwidth of a network path.…”
Get full text
Get full text
Thesis -
11
A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm
Published 2015“…The proposed model serves as path-independent fatigue life estimating tool hence can be used with any type of loading conditions. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
Autonomous road roundabout detection and navigation system for smart vehicles and cities using laser simulator–fuzzy logic algorithms and sensor fusion
Published 2020“…The path generation algorithm was fully derived within the local maps and tested with a WMR platform in real-time.…”
Get full text
Get full text
Get full text
Article -
15
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
16
Enhancing hyperparameters of LSTM network models through genetic algorithm for virtual learning environment prediction
Published 2025“…Genetic algorithms for hyperparameter optimization significantly contributed, with the GA + LSTM + ADAGRAD model achieving 88% and 87% accuracy in the 7th and 9th models for BBB course data. …”
Get full text
Get full text
Get full text
Article -
17
Performance analysis of constrained device virtualization algorithm
Published 2020“…We have adopted this technique in our research to virtualize the entire Internet of Things network so that virtual TCP/IP based protocols can operate on virtual networks for enabling interoperability. …”
Get full text
Get full text
Get full text
Article -
18
Impatient job scheduling under cloud computing
Published 2012“…The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
19
Accurate range free localization in multi-hop wireless sensor networks
Published 2019“…Finally, the GMSDP- algorithm achieves and provides a better value of RMSEs and the greatest localization estimation errors comparing with the CRLR algorithm and WLS algorithm.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
