Search Results - (( using function path algorithm ) OR ( network implementation based algorithm ))
Search alternatives:
- network implementation »
- implementation based »
- using function »
- path algorithm »
- function path »
-
1
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article -
2
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…This paper describes our project that has the ultimate goal of providing optimized solutions for enterprise network security. We describe our approach for implementing an optimized security assessment using Genetic Algorithm (GA). …”
Get full text
Get full text
Article -
3
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…This paper describes our project that has the ultimate goal of providing optimized solutions for enterprise network security. We describe our approach for implementing an optimized security assessment using Genetic Algorithm (GA). …”
Get full text
Get full text
Article -
4
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. …”
Get full text
Get full text
Thesis -
5
Genetic algorithm based network coding in wireless ad hoc networks
Published 2013“…Wireless network simulation is used to demonstrate and assess the implementation of network coding in wireless ad hoc networks. …”
Get full text
Get full text
Get full text
Thesis -
6
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
Get full text
Get full text
Thesis -
7
Electricity distribution network for low and medium voltages based on evolutionary approach optimization
Published 2015“…The test network is generated by fractal based distribution network generation model software tool. …”
Get full text
Get full text
Get full text
Thesis -
8
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…This survey paper is focused on the discussion of best optimal path routing algorithms in wireless sensor networks by using supervised machine learning approaches. …”
Get full text
Get full text
Conference or Workshop Item -
9
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…Network simulator (NS2) simulation findings demonstrate that the trust based algorithm achieves an average packet delivery ratio (PDR) of 87.3%, end to end delay (EED) of 7.47 ms and black hole detection accuracy of 90%. …”
Get full text
Get full text
Get full text
Thesis -
10
A-star (A*) algorithm implementation for robotics path planning navigation
Published 2018“…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah
Published 1997“…The euler's path it using pseudo input and Heuristic algorithm to find the minimum interlace. …”
Get full text
Get full text
Thesis -
12
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Conference Paper -
13
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…This research focuses on providing the IP layer with both the service location information and message level knowledge to minimise the standoff between the ISPs and P2P based DSD applications. For this purpose, it is proposed to employ an intelligent message routing by implementing Application Oriented Networking (AON) at the routing layer of the systems that are based on DSD architecture. …”
Get full text
Get full text
Thesis -
14
Hybrid path planning for indoor robot with Laplacian Behaviour-based control via four point-explicit group
Published 2014“…Consequently, the gradient of the potential functions would be used by the searching algorithm to generate path from starting to goal location. …”
Get full text
Get full text
Get full text
Article -
15
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
16
Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control
Published 2016“…However, this assumption may lead to inaccurate secondary path model. In this work, the modelling of acoustic path using FIR filters is incorporated for both algorithms for Wiener-Hammerstein structure. …”
Get full text
Get full text
Thesis -
17
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article -
18
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…Significant research has been conducted on Unmanned Aerial Vehicle (UAV) path planning using evolutionary algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), and Biogeographic-Based Optimization (BBO). …”
Get full text
Get full text
Thesis -
19
Robotic indoor path planning using dijkstra's algorithm with multi-layer dictionaries
Published 2016“…The path computed using the classic Dijkstra's algorithm is the shortest; however, it may not be the most feasible. …”
Get full text
Get full text
Conference or Workshop Item -
20
