Search Results - (( re evaluation path algorithm ) OR ( between transformational issues algorithm ))
Search alternatives:
- transformational issues »
- issues algorithm »
- evaluation path »
- path algorithm »
- re evaluation »
-
1
AUTOMATED GUIDED ROBOT (AGR)
Published 2007“…Compared to manual mobile robots, AGRs require sensors and control systems that generate feedback for the re-evaluation of an unexpected situation and to detect obstacles in the path the AGR is required to follow. …”
Get full text
Get full text
Final Year Project -
2
State-Aware re-configuration model for multi-radio wireless Mesh Networks
Published 2017“…The proposed algorithm re-assigns channels to radios and re-configures flows’ routes with aim of achieving a tradeoff between maximizing the network throughput and minimizing the re-configuration overhead. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
Ant-based vehicle congestion avoidance framework using vehicular networks / Mohammad Reza Jabbarpour Sattari
Published 2015“…Previous researches concentrated on using static algorithms to find the shortest path in VTRSs. However, providing a shortest path without considering other factors such as congestion, accidents, obstacles, travel time and speed is not a proper solution for vehicle traffic congestion problem. …”
Get full text
Get full text
Thesis -
4
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
5
Traffic management algorithms for LEO satellite networks
Published 2016“…In dealing with traffic routing problem, two algorithms, Dijkstra's Shortest Path and Genetic Algorithm (GA) are combined together and enhanced to re-strategize a better routing mechanism for a heterogeneous mix of traffic classes ranging from traditional voice calls to multimedia data services in Low Earth Orbit (LEO) satellite networks. …”
Get full text
Get full text
Get full text
Thesis -
6
Enhancing Autonomous Guided Vehicles with Red-Black TOR Iterative Method
Published 2023“…The main challenge in handling autonomous-driven vehicles is to offer an efficient and reliable path-planning algorithm equipped with collision-free feature. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Performance evaluation of manet in presence of black hole nodes
Published 2017“…And then we will apply an algorithm that can offer better performance evaluation of the MANET compare to previous work[1]. …”
Get full text
Get full text
Thesis -
8
Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data
Published 2024“…A new algorithm using ontology and clustering methods is used to identify and correct incomplete and inconsistent data, which resolves the availability and comprehensiveness of data, similarity between data items, and missing specific attributes of data. …”
Get full text
Get full text
Get full text
Thesis -
9
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…It involves the process of re-testing software after modifications. Ideally, to perform regression testing is to re-execute all the test cases on the modified software. …”
Get full text
Get full text
Thesis -
10
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
11
Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems
Published 2024“…The circular parameters between the pupil and the iris are found using current iris identification techniques but the accuracy creates an issue for the detection process during image processing. …”
Get full text
Get full text
Article -
12
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
13
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Get full text
Thesis -
14
-
15
The Development of Synthetic Algorithm of Fluid Flow Through Particle Image Velocimetry (PIV)
Published 2017“…The most common PIV cross-correlation algorithm, the standard Fast-Fourier Transform (FFT) is evaluated by measuring the displacement of particles in synthetically generated PIV images. …”
Get full text
Get full text
Final Year Project -
16
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Waste management using machine learning and deep learning algorithms
Published 2020“…For our research we did the comparisons between three Machine Learning algorithms, namely Support Vector Machine (SVM), Random Forest, and Decision Tree, and one Deep Learning algorithm called Convolutional Neural Network (CNN), to find the optimal algorithm that best fits for the waste classification solution. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
Sentiment analysis regarding childcare issues using Naive Bayes Algorithm / Alis Farhana Zulkipeli
Published 2025“…This study applies the Naive Bayes algorithm for sentiment analysis to assess public perceptions of childcare issues, particularly child abandonment and accidents. …”
Get full text
Get full text
Thesis -
19
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…In the past, MOD was mainly tackled using image registration, which discovers correspondences between consecutive frames using pair-wise grayscale spatial visual appearance matching under rigid and affine transformations. …”
Get full text
Get full text
Get full text
Thesis -
20
