Search Results - (( java application tree algorithm ) OR ( user evaluation path algorithm ))
Search alternatives:
- java application »
- application tree »
- user evaluation »
- evaluation path »
- tree algorithm »
- path algorithm »
-
1
Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria
Published 2018“…Dijkstra’s Algorithm is a shortest path algorithm that considers a single criterion only. …”
Get full text
Get full text
Get full text
Article -
2
-
3
The Effect of Rainfall on the UAV Placement for 5G Spectrum in Malaysia
Published 2023“…The problem of finding the UAV 3D placement is formulated with the objective to minimize the total path loss between the UAV and all users. The problem is solved by invoking two algorithms, namely Particle Swarm Optimization (PSO) and Gradient Descent (GD) algorithms. …”
Article -
4
Vision-based robot indoor navigation
Published 2022“…An algorithm is developed in the computer to achieve image processing, user input, path planning, simulation, and writing of output files. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
AUTOMATED GUIDED ROBOT (AGR)
Published 2007“…Compared to manual mobile robots, AGRs require sensors and control systems that generate feedback for the re-evaluation of an unexpected situation and to detect obstacles in the path the AGR is required to follow. …”
Get full text
Get full text
Final Year Project -
6
Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios
Published 2015“…While some scheduling algorithm take the moderate path but still be lacking especially in Edge Cell User Throughput necessitating the use of Relays or femtocells.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios
Published 2014“…While some scheduling algorithm take the moderate path but still be lacking especially in Edge Cell User Throughput necessitating the use of Relays or femtocells.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…The performance of the proposed routing algorithm is evaluated utilizing MATLAB. The assessment results indicate that it can find the forwarding path with comparatively low cost in the premise of ensuring security and has minimized the average energy consumption by nearly 50% even as the number of nodes has increased, when compared with the traditional ACO algorithm, an existing ant colony based routing algorithm and a current routing protocol for IoT.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network
Published 2019“…The element of Shortest Path First (SPF) Algorithm that is used in a routing protocol will be implemented. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
11
Scheduling tight deadlines for scientific workflows in the cloud
Published 2018“…The work in this paper focuses on the hurdle of scheduling tight deadline scientific workload. This article will evaluate the performance of the Proportional Deadline Constrained (PDC) algorithm using Cloudsim and compare it with the Deadline Constrained Critical Path (DCCP) scheduling algorithm. …”
Get full text
Get full text
Thesis -
12
Optimizing the latency of the 4G network by using Routing Algorithm / Rossidah Wan Abdul Aziz ... [et al.]
Published 2022“…The Routing Algorithm hasbeen used todetermine the route or path that data packets will take from source to destination. …”
Get full text
Get full text
Monograph -
13
Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks
Published 2014“…All these achieved because the proposed algorithm targets those users located at the cluster borders who more likely cause rank deficiency. …”
Get full text
Get full text
Thesis -
14
The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail
Published 2017“…This project use usability test for user testing system and functionality test to evaluate the efficiency of the game. …”
Get full text
Get full text
Thesis -
15
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
16
Design And Development Of Collision Avoidance Strategy For Differential Drive Mobile Robot
Published 2018“…In order to evaluate the performance of the proposed methods, a MATLAB Graphical User Interface (GUI) is created to plot the targeted and real path of the robot. …”
Get full text
Get full text
Monograph -
17
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
18
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Discrete simulation framework for wireless cellular networks.
Published 2008“…The simulator is built from the scratch to enable customization requirements of any research and to provide the freedom to understand, configure protocol modules, draw desired topologies and specifies the movement paths of the mobile users and to plot the necessary performance graphs. …”
Get full text
Get full text
Article -
20
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article
