Search Results - (( data virtualization path algorithm ) OR ( variable generation based algorithm ))
Search alternatives:
- data virtualization »
- virtualization path »
- variable generation »
- generation based »
- path algorithm »
-
1
Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi
Published 2008“…Therefore, it is the aim of this study to conduct a research about the Dijsktra’s algorithm implementation for shortest path calculation in 3D environment. …”
Get full text
Get full text
Get full text
Thesis -
2
Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation
Published 2018“…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
4
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…The multi-criterion energyefficient routing mechanism uses the ACO algorithm, inspired by ants' foraging behaviour. In Bluetooth M-LPNWSN systems, virtual ants explore paths based on signal robustness, distances, and energy consumption. …”
Get full text
Get full text
Get full text
Thesis -
5
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…This thesis presents the design and implementation of a new interaction test generation strategy, known as the Particle Swarm-based Test Generator (PSTG), for generating t-way and variable-strength test suites. …”
Get full text
Get full text
Thesis -
6
A variable combinatorial test suite strategy based on modified greedy algorithm
Published 2015“…This proposed will suggest a new CIT strategy based on a modified greedy algorithm (MGA) with addressing the supporting of variable strength interaction to generate a satisfactory test suite size.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
Get full text
Get full text
Article -
8
Optimization of hydropower reservoir operation based on hedging policy using Jaya algorithm
Published 2023Article -
9
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
Published 2018“…To generate test cases that satisfy MC/DC criterion, many researchers adopt neighborhood based meta-heuristics algorithms (including that of Simulated Annealing and Hill Climbing) as the problem itself is neighborhood based. …”
Get full text
Get full text
Thesis -
10
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…The architecture includes MD5 padding block, data path, and a controller. A general concept and implementation of the MD5 hash function is described. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Maximizing power generation in variable speed micro-hydro with power point tracking
Published 2022“…As such, this paper aims to explore and develop a feasible maximum power point tracker (MPPT) with perturb and observe (P&O) and genetic algorithm (GA) in providing optimal power generation for variable speed micro-hydro system. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
13
A new variable strength t-way strategy based on the cuckoo search algorithm
Published 2019“…Despite much progress, existing strategies have not sufficiently dealt with more than one interaction between input parameters (termed variable strength tway). Complementing existing works, this paper proposes a new variable strength cuckoo search algorithm, called VCS. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
-
17
-
18
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…The architecture includes MD5 padding block, data path, and a controller. A general concept and implementation of the MD5 hash function is described. …”
Get full text
Get full text
Get full text
Article -
19
Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition
Published 2010“…In the second stage, the developed variable length genetic algorithm is used to select different sets of lexical cues to constitute the dynamic Bayesian networks' random variables. …”
Get full text
Get full text
Article -
20
Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation
Published 2018“…The generation of variable strength test suites is a non-deterministic polynomial-time (NP) hard computational problem \cite{BestounKamalFuzzy2017}. …”
Get full text
Get full text
Get full text
Book Chapter
