Search Results - (( mode selection path algorithm ) OR ( based instruction access algorithm ))
Search alternatives:
- instruction access »
- access algorithm »
- mode selection »
- selection path »
- path algorithm »
-
1
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…Attack paths that satisfy certain optimization criteria are then selected and presented as possible components of the security solution. …”
Get full text
Get full text
Article -
2
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…Attack paths that satisfy certain optimization criteria are then selected and presented as possible components of the security solution. …”
Get full text
Get full text
Article -
3
A Mininet emulation study for SDN fat tree data center sleep mode routing algorithms
Published 2025“…In this work meta heuristic algorithm is incorporated at the SDN central controller in a fat tree-based data centre for bandwidth usage monitoring, sleep decisions and path selection using Mininet emulation. …”
Article -
4
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The system is then used in path prediction mode for reconstructing the missing parts of the trajectory when actual positioning data is unavailable. …”
Get full text
Get full text
Thesis -
5
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2017“…MicroNIR was set up in two different scan modes to study the effect of path length to the performance of spectral measurement. …”
Get full text
Get full text
Get full text
Article -
6
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2024“…MicroNIR was set up in two different scan modes to study the effect of path length to the performance of spectral measurement. …”
Article -
7
An Energy-Efficient Cross-Layer approach for cloud wireless green communications
Published 2017“…More precisely, network layer could utilize the MAC layer and physical layer information to establish an energy efficient route path to be used in forwarding data. The proposed EECL approach uses X-MAC protocol in support of duty cycle which introduces short preambles that switches to wake-up/sensing mode only for nodes belonging to routing path while the other nodes set to be in sleep mode. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Real-time interpolator of CNC parametric curves with chord-error and feed-rateconstraints
Published 2025“…The chord-error constraints comprise geometric and kinematic properties of different parametric curves, coveringbends and sharp turns. The resulting algorithm was executed both in real-time, online mode by driving the CNC machine directly, and in an offline mode by using a stored RS274/NGC G-code file. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Levy slime mould algorithm for solving numerical and engineering optimization problems
Published 2022“…The SMA is a newly developed metaheuristic algorithm that is inspired by the slime moulds natural oscillation mode. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
LED based NIR spectroscopy for detection of lard adulteration in palm oil via chemometrics / Katrul Nadia Basri
Published 2017“…MicroNIR was set up in two different scan modes to study the effect of path length to the performance of spectral measurement. …”
Get full text
Get full text
Thesis -
12
Power allocation with non-orthogonal multiple access for 5G heterogeneous network
Published 2023“…The system models were derived to analyze the power performance based on the power allocation factor. An algorithm is constructed based on the deep learning coordinated multi-point to simulate the performance of the downlink 5G. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks
Published 2014“…The Greedy Forwarding Strategy (GFS) has been the most used strategy in position-based routing protocols. The GFS algorithm was designed as a high-performance protocol that adopts hop count in soliciting shortest path. …”
Get full text
Get full text
Get full text
Thesis -
14
Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks
Published 2022“…Also, implementing all GCLs in the selected path based on TT evaluations without considering their impacts on the AVB performance results in improper scheduling designs. …”
Get full text
Get full text
Thesis -
15
Privacy-aware personal navigation services / Melissa Shahrom
Published 2013“…This innovation produces an algorithm that is able to protect location privacy and at the same time generate robust navigation instructions without depending on precise location information. …”
Get full text
Get full text
Book Section -
16
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Future development can be carried out by creating a database based on the user’s standard of measure and accessing it whenever the user starts the program.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Development of IoT-based automated dynamic emergency response system against fire incidents in academic building
Published 2023“…The system also includes an emergency response website that allows users to access real-time information about the fire incident, location, severity, and evacuation instructions. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Exploring the unseen: Unleashing the potential of Synthesia AI in pedagogical approaches / Ts. Jacqueline Joseph
Published 2023“…Incorporating demographic information of the learners into the creation of a video's simulated human speaker's appearance, voice, and vocabulary can enhance accessibility and interest in the content. Subsequently, a script for the digital speaker is generated based on the analysis of user-entered instructional text. …”
Get full text
Get full text
Get full text
Article -
19
Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran
Published 2021“…Subsequently, a computer algorithm and interfacing tool is developed. The tool enables any personal with basic computer literacy and access to the tool and data file to process the data and asses the HKP of the flight at ease. …”
Get full text
Get full text
Get full text
Thesis -
20
Load balancing and congestion control in ATM using fuzzy logic and spiking neuron network / Tan Jiann Shin
Published 2005“…The proposed intelligent routing algorithm, integrates spiking neuron network with fuzzy link cost for the dynamic routing computation. …”
Get full text
Get full text
Thesis
