Search Results - (( rate detection path algorithm ) OR ( _ simulation modified algorithm ))*
Search alternatives:
- simulation modified »
- rate detection »
- detection path »
- path algorithm »
-
1
A generalized laser simulator algorithm for mobile robot path planning with obstacle avoidance
Published 2022“…According to the results, the GLS algorithm outperformed the original laser simulator (LS) method in path and success rate. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Safe avoidance path detection using multi sensor integration for small unmanned aerial vehicle
Published 2018“…In the experiment conducted, we successfully detect and create a safe avoidance path for both situations. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Identification and mitigation of non-line-of-sight path effect using repeater for hybrid ultra-wideband positioning and networking system
Published 2021“…Hence, a higher probability of accuracy across the entire tested area can be achieved for the UWB positioning system by mitigating the NLOS path effect using the proposed algorithm. Besides that, the transmission of the line-of-sight (LOS) signal attains a data rate of around 15 times higher than the NLOS signal at a bit-error-rate (BER) of 10-5 in the indoor networking system. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
Get full text
Get full text
Thesis -
5
Optimized clustering with modified K-means algorithm
Published 2021“…Testing on real data sets showed consistency results as the simulated ones. Generally, the proposed modified k-means algorithm is able to determine the optimum number of clusters for huge data.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
Get full text
Get full text
Get full text
Thesis -
7
A Modified Simulated Kalman Filter Optimizer with State Measurement, Substitution Mutation, Hamming Distance Calculation, and Swap Operator
Published 2021“…The modified algorithm is called Discrete Simulated Kalman Filter Optimizer (DSKFO). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A Modified Simulated Kalman Filter Optimizer with State Measurement, Substitution Mutation, Hamming Distance Calculation, and 2-Opt Operator
Published 2021“…This paper presents modifications to measurement and estimation in SKF to accommodate the discrete search space. The modified algorithm is called Discrete Simulated Kalman Filter Optimizer (DSKFO). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…On the other hand, the detection algorithm based on the energy consumption achieves PDR of 91.6%, EED of 14.03 ms and detection rate accuracy of 93%. …”
Get full text
Get full text
Get full text
Thesis -
10
Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm
Published 2012“…This document is a study about LEACH algorithm where the implementation was done using OMNeT++ network simulator to study the performance of this algorithm in term of network lifetime. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
12
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
13
Facial emotion detection using GPSO and Lucas-Kanade algorithms
Published 2010Get full text
Working Paper -
14
Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET
Published 2022“…Lower trust level node is selfish node and they are detected and ignored from path. It increases the lifespan of network and throughput and minimizes the end to end delay and energy consumption. …”
Get full text
Get full text
Article -
15
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
16
A hybrid rate control mechanism for forwarding and congestion control in named data network
Published 2020“…Named Data Networking (NDN) is an emerging Internet architecture that employs a pull-based, in-path caching, hop-by-hop, and multi-path transport architecture. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Comparison of path planning in simulated robot
Published 2020“…There are 4 path planning algorithms will be compared, which are Dijkstra’s algorithm, A* algorithm, RapidExploring Random Tree (RRT) algorithm, and the last one is an algorithm modified from A*. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
1D Multigrid Solver For Finite Element Method
Published 2022“…The new algorithm also has been tested using time simulation. …”
Get full text
Get full text
Monograph -
19
Estimation of the denitrification in the lower Mississippi Valley
Published 2001“…The CREAMS denitrification algorithm was modified to account for the high soil moisture conditions by incorporating a water function.The average annual denitrification value simulated by using modified algorithm was higher than the one predicted by CREAMS algorithm.This result is expected because the modified algorithm uses a water function to reflect the degree of soil saturation.…”
Get full text
Get full text
Conference or Workshop Item -
20
