Search Results - (( some applications among algorithm ) OR ( its application a algorithm ))*
Search alternatives:
- applications among »
- some applications »
- among algorithm »
- its application »
- application a »
- a algorithm »
-
1
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
2
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…In this thesis, I2tswTCM is proposed as an enhanced version of the famous tswTCM marker scheme used in the current DiffServ architecture, this new algorithm improves fairness in the excess bandwidth among different aggregates in a DiffServ networks and it has a better fairness than all other algorithms for different network provision levels. …”
Get full text
Get full text
Thesis -
3
A novel N-input voting algorithm for X-by-wire fault-tolerant systems
Published 2014“…In this paper, a novel voting algorithm is introduced for real-time fault-tolerant control systems, appropriate for applications in which N is large. …”
Get full text
Get full text
Get full text
Article -
4
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
Published 2019“…Several areas of engineering have adopted the idea that swarms can solve complex problems and some of them are described in [13]. Some of the examples highlighted by [13] are a combinatorial optimisation, routing communications network, as well as solving robotics applications. …”
Get full text
Get full text
Monograph -
5
The Performance of Chlorophyll-a Distribution Estimation by Using Ratio Algorithm on Landsat-8 in Sungai Merbok Estuary / Jesse Vince Rabing ... [et al.]
Published 2022“…This study explores the applicability of ratio algorithms for estimation of the chl- a concentration at Sungai Merbok by assessing chl-a distribution pattern built by the algorithms and evaluating each algorithm for their errors compared to in-situ data. …”
Get full text
Get full text
Get full text
Article -
6
Spatial network k-Nearest neighbor: A survey and future directives
Published 2023“…There are many types of nearest neighbor algorithms. One of them is called k-nearest neighbor (k- NN), a technique that helps to find number of k closest objects from a user location within a specified range of area. k- NN road network algorithm studies have been through various query performance discussions. …”
Conference Paper -
7
-
8
-
9
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
10
A survey: Challenges of image segmentation based fuzzy c-means clustering algorithm
Published 2024journal::journal article -
11
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
12
-
13
Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications
Published 2019“…Each vehicle was associated with a predefined weight value based on its relevance. …”
Get full text
Get full text
Article -
14
Reactive power imbalance method for islanding detection in micro-grid operation
Published 2014“…Micro-grids usage among consumers has become a new attraction due their several of advantage. …”
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
An Evolutionary Stream Clustering Technique for Outlier Detection
Published 2020“…Most of the traditional density-based clustering is not applicable in data streams due to its own characteristics. …”
Get full text
Get full text
Conference or Workshop Item -
18
Dynamic area coverage algorithms for static and mobile wireless sensor network environments using voronoi techniques
Published 2011“…Each static node then checks whether there exist a region in its polygon without coverage. If a coverage-hole is found, static nodes compute the size of the hole and request mobile nodes to target locations for optimal coverage. …”
Get full text
Get full text
Thesis -
19
Advance video analysis system and its applications
Published 2010“…Among the main features of this research some are, Event Id, Video Id, and Human Id which give detail information about the events, videos and other tracked objects. …”
Get full text
Get full text
Get full text
Article -
20
Vehicle routing problem: models and solutions
Published 2008Get full text
Get full text
Get full text
Article
