Search Results - (( group evaluation path algorithm ) OR ( data distribution force algorithm ))*
Search alternatives:
- distribution force »
- data distribution »
- group evaluation »
- evaluation path »
- force algorithm »
- path algorithm »
-
1
Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model
Published 2025“…Famous simulation models include agent-based crowd guiding. The evaluation states that the existing agent-based steering model computes the complete set of collision-free paths with the least travel time among agents to make path decisions based on updated information. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
The impact of clustering on the average path length in wireless sensor networks
Published 2015“…This property is evaluated by comparing the performance of several clustering algorithms with respect to the average path length. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Three-dimensional coverage control for multi-unmanned aerial vehicle
Published 2024“…The performance of the transitioned 3D algorithm is evaluated against the original 2D MBC algorithm in terms of computational load, convergence analysis, path length, coverage quality, and scalability. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Enhancing Autonomous Guided Vehicles with Red-Black TOR Iterative Method
Published 2023“…The existing block over-relaxation method and its variants evaluate the computation by obtaining four Laplacian potentials per computation in groups. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…Wavelet decomposition is utilized to extract data information from texture data. In searching process, the data are retrieved based on data distribution. …”
Get full text
Get full text
Thesis -
6
Comprehensive review of drones collision avoidance schemes: challenges and open issues
Published 2024“…We explore collision avoidance methods for UAVs from various perspectives, categorizing them into four main groups: obstacle detection and avoidance, collision avoidance algorithms, drone swarm, and path optimization. …”
Get full text
Get full text
Get full text
Article -
7
A new multicast-based architecture to support host mobility in IPv6
Published 2003“…KEYWORDS:. Mobile IPv6, hash algorithm, .multicast group.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…Later, this MOCSSA is applied on service restoration to ensure the proposed algorithm technique is suitable in selecting the optimal switches for supply recovery after the line section is isolated from the system either by forced outage or planned outage purposes. …”
Get full text
Get full text
Thesis -
9
Improving Network Consistency and Data Availability Using Fuzzy C Mean Clustering Algorithm in Wireless Sensor Networks
Published 2024thesis::doctoral thesis -
10
A Review: Current Trend of Immersive Technologies for Indoor Navigation and the Algorithms
Published 2024“…Numerous studies have been conducted on the issue. However, a fair evaluation and comparison of indoor navigation algorithms have not been discussed further. …”
Get full text
Get full text
Get full text
Article -
11
Design and development of prototype robot gripper for object weight measurement
Published 2014“…The proposed work also includes the development of new algorithm for data extraction and signal conditioning analysis that will be loaded into the microcontroller system. …”
Get full text
Get full text
Thesis -
12
Enhancing clustering algorithm with initial centroids in tool wear region recognition
Published 2020“…It is embedded with a new tactic to recapture the K value and new initial seedings computation to kick off the system until it converges. Force components of cutting force Fc, thrust force Ft and perpendicular cutting force Fcn were extracted from Neo-MoMac cutting force measurement device. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
A new multicast-based architecture to support host mobility in IPv6
Published 2003“…A new multicast group join/leave mechanism for mobile nodes (MNs) is proposed. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Energy-efficient routing using novel optimization with Tabu techniques for Wireless Sensor Network
Published 2022“…Moreover, the sensor nodes are grouped to form clusters in a cluster-based WSN environment. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…Extensive computations utilizing MATLAB 2018a on the Intel Core i7/Gen 10 processor and 16 GB of RAM are used to evaluate the algorithm efficacy. According to the blueprint of our heuristic method, the allocation and the optimum number of controllers under an effective decentralized policy could achieve higher efficiency. …”
Get full text
Get full text
Thesis -
19
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…The development and the wide spread use of the World Wide Web allow for convenient electronic data storage and distribution all over the world. …”
Get full text
Get full text
Thesis -
20
Bat optimized link state routing protocol for energy-aware mobile ad-hoc networks
Published 2023“…The symmetry between OLSR of MANET and Bat Algorithm (BA) is that both of them use the same mechanism for finding the path via sending and receiving specific signals. …”
Article
