Search Results - (( mode selection path algorithm ) OR ( based instruction ((age algorithm) OR (means algorithm)) ))
Search alternatives:
- means algorithm »
- mode selection »
- selection path »
- path algorithm »
- age algorithm »
-
1
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…Attack paths that satisfy certain optimization criteria are then selected and presented as possible components of the security solution. …”
Get full text
Get full text
Article -
2
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…Attack paths that satisfy certain optimization criteria are then selected and presented as possible components of the security solution. …”
Get full text
Get full text
Article -
3
-
4
A Mininet emulation study for SDN fat tree data center sleep mode routing algorithms
Published 2025“…In this work meta heuristic algorithm is incorporated at the SDN central controller in a fat tree-based data centre for bandwidth usage monitoring, sleep decisions and path selection using Mininet emulation. …”
Article -
5
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The system is then used in path prediction mode for reconstructing the missing parts of the trajectory when actual positioning data is unavailable. …”
Get full text
Get full text
Thesis -
6
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2017“…MicroNIR was set up in two different scan modes to study the effect of path length to the performance of spectral measurement. …”
Get full text
Get full text
Get full text
Article -
7
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2024“…MicroNIR was set up in two different scan modes to study the effect of path length to the performance of spectral measurement. …”
Article -
8
An Energy-Efficient Cross-Layer approach for cloud wireless green communications
Published 2017“…More precisely, network layer could utilize the MAC layer and physical layer information to establish an energy efficient route path to be used in forwarding data. The proposed EECL approach uses X-MAC protocol in support of duty cycle which introduces short preambles that switches to wake-up/sensing mode only for nodes belonging to routing path while the other nodes set to be in sleep mode. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Real-time interpolator of CNC parametric curves with chord-error and feed-rateconstraints
Published 2025“…The chord-error constraints comprise geometric and kinematic properties of different parametric curves, coveringbends and sharp turns. The resulting algorithm was executed both in real-time, online mode by driving the CNC machine directly, and in an offline mode by using a stored RS274/NGC G-code file. …”
Get full text
Get full text
Get full text
Article -
10
Levy slime mould algorithm for solving numerical and engineering optimization problems
Published 2022“…The SMA is a newly developed metaheuristic algorithm that is inspired by the slime moulds natural oscillation mode. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
LED based NIR spectroscopy for detection of lard adulteration in palm oil via chemometrics / Katrul Nadia Basri
Published 2017“…MicroNIR was set up in two different scan modes to study the effect of path length to the performance of spectral measurement. …”
Get full text
Get full text
Thesis -
12
A WEB-BASED SYSTEM FOR THE PREDICTION OF STUDENT PERFORMANCE IN UPCOMING PUBLIC EXAMS BASED ON ACADEMIC RECORDS
Published 2023“…All of these algorithms will be cross validate using Mean Absolute Error (MAE) in order to compare all of the accuracies of the algorithms.…”
Get full text
Get full text
Final Year Project Report / IMRAD -
13
GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks
Published 2014“…The Greedy Forwarding Strategy (GFS) has been the most used strategy in position-based routing protocols. The GFS algorithm was designed as a high-performance protocol that adopts hop count in soliciting shortest path. …”
Get full text
Get full text
Get full text
Thesis -
14
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…The key results that were found during the project is that it is possible to find the semantic features with the system can produce results based on the text meaning such as the system. With this information the system is able to produce results that can gives the user some useful information which can contribute in the later construction of khutbah texts. …”
Get full text
Get full text
Thesis -
15
Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks
Published 2022“…Also, implementing all GCLs in the selected path based on TT evaluations without considering their impacts on the AVB performance results in improper scheduling designs. …”
Get full text
Get full text
Thesis -
16
Tracking moving targets in wireless sensor networks using extended diffusion strategies of distributed Kalman filter
Published 2013“…As a simulation study, we applied the algorithms in a network to track the position and speed of a projectile and compared the results with real world circumstances, using the concept of transient mean square deviations of network as a cost function. …”
Get full text
Get full text
Conference or Workshop Item -
17
Developing students' mathematical thinking: how far have we came?
Published 2015“…Several findings from studies that focused on students' ability to provide reasoning and give meanings to concepts and algorithms are highlighted. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
18
Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran
Published 2021“…A scatter graph is outputted displaying the FL, Datetime, and ASE values to visualize the ASE pattern and compliance throughout the flight duration. The algorithms’ accuracy is evaluated against the method adopted by China RMA comparing the Mean ASE values returned 98.84% accuracy using the same dataset. …”
Get full text
Get full text
Get full text
Thesis -
19
Load balancing and congestion control in ATM using fuzzy logic and spiking neuron network / Tan Jiann Shin
Published 2005“…The proposed intelligent routing algorithm, integrates spiking neuron network with fuzzy link cost for the dynamic routing computation. …”
Get full text
Get full text
Thesis -
20
Graphical user interface test case generation for android apps using Q-learning / Husam N. S. Yasin
Published 2021“…The computation time complexity of the Q-Learning-based test coverage algorithm was also analyzed. …”
Get full text
Get full text
Get full text
Thesis
