Search Results - (( user evaluation between algorithm ) OR ( _ identification path algorithm ))
Search alternatives:
- identification path »
- evaluation between »
- between algorithm »
- _ identification »
- user evaluation »
- path algorithm »
-
1
Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria
Published 2018“…In order to achieve the objective, Weighted Sum-Dijkstra’s Algorithm (WSDA), a combination method between WSM and Dijkstra’s Algorithm is applied to solve multiple criteria network problems. …”
Get full text
Get full text
Get full text
Article -
2
Efficient relay placement algorithm using landscape aware routing (erpalar)
Published 2011“…Chromosome in GA-2 is the AP, and user slots on the AP as genes. Since this algorithm win be used at different deployment sites, a crossover rate of 0.5 is recommended for both GA-I and GA-2; and mutation rate of 0.1 for GA-l and GA-2. …”
Get full text
Get full text
Thesis -
3
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
4
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article -
5
Optimization of drilling path using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Article -
6
Comparative Study of Weighted Product–Dijkstra’s Algorithm and All Possible Path Approach Based on Multiple Criteria and Multi-Dimensions
Published 2020“…Dijkstra’s algorithm was one of the shortest path algorithms that would be used to identify the path with the least cost. …”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…This separation contributes in determining the effect of access point on the network performance as well as it allows in evaluating the algorithms that based on the differentiation between the access point and stations. …”
Get full text
Get full text
Get full text
Thesis -
10
Gait identification and optimisation for amphi-underwater robot by using ant colony algorithm
Published 2019“…It is very difficult to estimate the movement of the robot to avoid obstacles and choose the alternative path. Hence, this research presents the point-to-point gait identification or path planning of the behavious of the robot to manuever autonomously on both on-land and underwater environment. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
An improved narrowband active noise control system without secondary path modelling based on the time domain
Published 2019“…There are several available ANC algorithms that do not require secondary path estimation for modifying the FxLMS algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
13
-
14
-
15
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006Get full text
Get full text
Get full text
Proceeding Paper -
16
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
17
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Evaluation of cloud brokering algorithms in cloud based data center
Published 2015“…In this paper, two new cloud brokering algorithms, and their initial evaluation, are proposed.…”
Get full text
Get full text
Get full text
Article -
20
A Rule Extraction Algorithm That Scales Between Fidelity and Comprehensibility
Published 2012“…Since the needs of comprehensibility or fidelity may vary depending on the user or application, this paper presented a significance based rule extraction algorithm that allows a user set parameter to scale between the desired degree of fidelity and comprehensibility of the rules extracted. …”
Get full text
Get full text
Get full text
Article
