Search Results - (( using function path algorithm ) OR ( network implementation using algorithm ))
Search alternatives:
- network implementation »
- implementation using »
- using algorithm »
- using function »
- path algorithm »
- function path »
-
1
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article -
2
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…This paper describes our project that has the ultimate goal of providing optimized solutions for enterprise network security. We describe our approach for implementing an optimized security assessment using Genetic Algorithm (GA). …”
Get full text
Get full text
Article -
4
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…This paper describes our project that has the ultimate goal of providing optimized solutions for enterprise network security. We describe our approach for implementing an optimized security assessment using Genetic Algorithm (GA). …”
Get full text
Get full text
Article -
5
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Modeling dynamic weight for 3D navigation routing
Published 2007“…The first part discusses the 3D navigation model, dynamic weight and its functional requirements. The second part presents the 3D dynamic network model and elaborates on the possible solution using SSSP routing algorithm and its implementation. …”
Get full text
Get full text
Conference or Workshop Item -
7
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…This research implements the SHA-3 in ways such that all the step mapping algorithms are logically combined to only use the input lanes of the state array to eliminate the intermediate logics and reduces the area size. …”
Get full text
Get full text
Thesis -
8
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. …”
Get full text
Get full text
Thesis -
9
Genetic algorithm based network coding in wireless ad hoc networks
Published 2013“…Wireless network simulation is used to demonstrate and assess the implementation of network coding in wireless ad hoc networks. …”
Get full text
Get full text
Get full text
Thesis -
10
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…The proposed energyaware routing algorithm (EARMCP) implements efficient flow routing mechanisms for network traffic to minimize the number of active links and 5G-DC devices. …”
Get full text
Get full text
Thesis -
11
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…This survey paper is focused on the discussion of best optimal path routing algorithms in wireless sensor networks by using supervised machine learning approaches. …”
Get full text
Get full text
Conference or Workshop Item -
12
Electricity distribution network for low and medium voltages based on evolutionary approach optimization
Published 2015“…Optimum placement of distribution substations and determination of their sizing and feeder routing is another major issue of distribution network planning. This thesis proposes an algorithm to find the optimum distribution substation placement and sizing by utilizing the PSO algorithm and optimum feeder routing using modified Minimum Spanning Tree (MST). …”
Get full text
Get full text
Get full text
Thesis -
13
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…Network simulator (NS2) simulation findings demonstrate that the trust based algorithm achieves an average packet delivery ratio (PDR) of 87.3%, end to end delay (EED) of 7.47 ms and black hole detection accuracy of 90%. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
Design and implementation of an object-following system by using DJI Tello drone
Published 2025“…The system employs computer vision techniques, particularly Convolutional Neural Networks (CNNs), to detect and track moving objects in real time, while dynamically adjusting the drone’s flight path to maintain continuous visual contact. The core functionality involves designing and testing an algorithm that processes the video feed from the drone’s camera and transmits flight commands to the drone's controller. …”
Get full text
Get full text
Get full text
Article -
16
Design And Implementation of an Object-Following System by Using DJI Tello Drone
Published 2026journal::journal article -
17
A-star (A*) algorithm implementation for robotics path planning navigation
Published 2018“…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah
Published 1997“…The euler's path it using pseudo input and Heuristic algorithm to find the minimum interlace. …”
Get full text
Get full text
Thesis -
19
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Conference Paper -
20
Hybrid path planning for indoor robot with Laplacian Behaviour-based control via four point-explicit group
Published 2014“…Consequently, the gradient of the potential functions would be used by the searching algorithm to generate path from starting to goal location. …”
Get full text
Get full text
Get full text
Article
