Search Results - (( its application need algorithm ) OR ( _ application system algorithm ))
Search alternatives:
- application need »
- system algorithm »
- need algorithm »
-
1
Scan Matching and KNN Classification for Mobile Robot Localisation Algorithm
Published 2017Get full text
Get full text
Conference or Workshop Item -
2
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…This enables smart grid to communicate with each of its devices and applications in monitoring and controlling the components remotely. …”
text::Thesis -
3
Ant colony optimization algorithm for dynamic scheduling of jobs in computational grid
Published 2012“…Job scheduling problem is classified as an NP-hard problem.Such a problem can be solved only by using approximate algorithms such as heuristic and meta-heuristic algorithms.Among different optimization algorithms for job scheduling, ant colony system algorithm is a popular meta-heuristic algorithm which has the ability to solve different types of NP-hard problems.However, ant colony system algorithm has a deficiency in its heuristic function which affects the algorithm behavior in terms of finding the shortest connection between edges.This research focuses on a new heuristic function where information about recent ants’ discoveries has been considered.The new heuristic function has been integrated into the classical ant colony system algorithm.Furthermore, the enhanced algorithm has been implemented to solve the travelling salesman problem as well as in scheduling of jobs in computational grid.A simulator with dynamic environment feature to mimic real life application has been development to validate the proposed enhanced ant colony system algorithm. …”
Get full text
Get full text
Monograph -
4
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…PID is considered as simple yet powerful controller for many kinds of applications. In designing PID, user needs to set appropriate controller gain to achieve a desired performance of the control system, in terms of time response and its steady state error. …”
Get full text
Get full text
Book Chapter -
5
Impatient task mapping in elastic cloud using genetic algorithm
Published 2011Get full text
Get full text
Get full text
Article -
6
A new vertical edge detection algorithm and its application
Published 2008“…Edge detection is a very important process for many image processing applications, especially in Car License Plate Detection and Recognition Systems(CLPDRS). …”
Get full text
Get full text
Conference or Workshop Item -
7
Development of improved metaheuristic algorithms for modelling and control of a flexible manipulator system
Published 2019“…The developed algorithms have been applied to optimize Proportional Integral Derivative (PID) controller parameters for a flexible manipulator system and an inverted pendulum system. …”
Get full text
Get full text
Research Report -
8
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
9
-
10
Delay-Prioritized Scheduling (DPS) for Real Time Traffic in 3GPP LTE System
Published 2010“…Given that the co-existence of multimedia applications will be a norm in the future wireless systems, their quality of service (QoS) requirements need to be guaranteed. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
12
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
13
Implementation of Cognitive Mapping Algorithm for Robot Navigation System
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
14
Railway shortest path planner application using ant colony optimization algorithm / Muhammad Hassan Firdaus Ruslan
Published 2017“…For the process module, Ant Colony Optimization (ACO) algorithm was used to find the shortest path. Using ACO, a Railway Shortest Path Planner (RSPP) application will be developed to help user determine their shortest path from one station to another. …”
Get full text
Get full text
Thesis -
15
-
16
Development of optimization Alghorithm for uncertain non-linear dynamical system
Published 2004Get full text
Get full text
Monograph -
17
OPTIMIZED ARCHITECTURE DESIGN AND IMPLEMENTATION OF OBJECT TRACKING ALGORITHM ON FPGA
Published 2013“…FPGA based Object tracking implementation is one of the most recent video surveillance applications in embedded systems. In general, FPGA implementation is more efficient than general purpose computers in attaining high throughput due to its parallelism and execution speed. …”
Get full text
Get full text
Thesis -
18
Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions
Published 2022“…Among all proposed algorithms, perturb and observe (P&O) algorithm is the most popular due to its simplicity and good convergence. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
