Search Results - (( java application during algorithm ) OR ( parameter destination based algorithm ))
Search alternatives:
- parameter destination »
- application during »
- destination based »
- java application »
- during algorithm »
-
1
Modelling of multi-robot system for search and rescue
Published 2023“…In this project, this sensor-based algorithm is known as the Obstacle Avoidance Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Artificial Bee Colony for Minimizing the Energy Consumption in Mobile Ad Hoc Network
Published 2019“…The evaluation is based on node speed and packet size topology parameters. …”
Get full text
Get full text
Article -
3
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
4
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…In the RESP, this protocol takes routing decisions based on vehicle proximity to the destination, the expected transmission count (ETX), density-aware collision probability, and relative velocity-based link stability measurement. …”
Get full text
Get full text
Thesis -
5
Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff
Published 2011“…Subsequently, both algorithms were applied to the test environments. Finally, the performances of both algorithms were analyzed and evaluated based on the required criteria. …”
Get full text
Get full text
Thesis -
6
Comparison of DSR, AODV and DSDV routing protocols in mobile ad-hoc networks: A survey
Published 2014“…A mobile ad hoc network (MANET) is a collection of mobile nodes that is connected through a wireless medium forming rapidly changing topologies.Mantes are infrastructure less and can be set up anytime, anywhere.We have conducted survey of protocol properties of various MANET routing algorithms and analyzed them.The routing algorithms considered are classified into three categories proactive (table driven) , reactive (on demand) and Hybrid protocol.The algorithms considered are Dynamic Source Routing (DSR), Ad-hoc On-Demand Distance Vector Routing (AODV) and Destination sequence Vector (DSDV) have been proposed to solve the multi hop routing problem in Ad-hoc networks.The comparison among three routing protocols are based on the various protocol property parameters such as Routing overhead, packet delivery ratio, end-to-end delay, path optimality, and throughput are some metrics commonly used in the comparisons.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Collision avoidance mechanisms using artificial potential field for UAVs
Published 2025“…The APF algorithm, based on the combination of attractive and repulsive potential functions, is modeled and simulated in MATLAB to guide UAVs toward target destinations while avoiding obstacles. …”
Get full text
Get full text
Get full text
Article -
8
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…Then, timetabling process is performed to identify a set of departure times at both origin and destination based on predefined parameters. The multiobjective set covering model is used by including some real-world restrictions to find number of buses and drivers as it can represent the problem clearly for implementation. …”
Get full text
Get full text
Thesis -
9
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…This research addresses the performance issue of grid computing based on resource management, resource broker, resource scheduling and algorithm for middleware in the grid environment. …”
Get full text
Get full text
Get full text
Thesis -
10
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
11
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…ESRSBRP selects the highly stable route in term of energy as well as mobility of nodes for the individual data transmission between the source and destination. An enhanced algorithm which is used to improve the video quality was proposed, namely, Effective Broadcast Control Routing algorithm (EBCRA). …”
Get full text
Get full text
Get full text
Thesis -
12
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The proposed model consists of Dynamic-Coalition framework, Static-Coalition algorithm, and Coalition-Based Index-Tree framework. …”
Get full text
Get full text
Get full text
Thesis -
14
Traffic monitoring system with emergency support using SOM
Published 2020“…In the classification section, all the processed parameters are input into the classification algorithm to classify the groups to which the input parameters belong. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
ANALYSIS OF PERFORMANCE PARAMETERS FOR WIRELESS NETWORK USING SWITCHING MULTIPLE ACCESS CONTROL METHOD
Published 2023“…Using OPNET 10.5, the results show that the presented switching-based multiple access control model can achieve a throughput value of 98.3 %, data transmission delay of about 40.2 ms, and 0.024 % of packet losses during data transmission between the source and destination. …”
Article -
16
-
17
-
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
20
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
