Search Results - critical ((system algorithm) OR (based algorithm))*

Search alternatives:

Refine Results
  1. 1

    Indoor global path planning based on critical cells using dijkstra algorithm by Azrul Amri, Jamal, Engku Fadzli Hasan, Syed Abdullah, Fatma Susilawati, Mohamad

    Published 2015
    “…Path planning has been implemented in various robotics systems, and the results checked. This paper proposes global path planning based on grids representation in an indoor environment using Dijkstra algorithm. …”
    Get full text
    Get full text
    Article
  2. 2

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…This method makes a tradeoff between token-based and permission-based. It does not utilize any token, that is similar to permission-based, and the latest node having the critical section influences the entrance of the next node to the critical section, that is similar to token-based algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Feature-based face recognition system using utilized artificial neural network by Chai, Tong Yuen

    Published 2010
    “…The proposed automatic feature-based face recognition system has efficiency more than 95% under the stated critical conditions. …”
    Get full text
    Thesis
  4. 4

    Genetic algorithm fuzzy logic for medical knowledge-based pattern classification by Tan, Chin Hooi, Tan, Mei Sze, Chang, Siow Wee, Yap, Keem Siah, Yap, Hwa Jen, Wong, Shen Yuong

    Published 2018
    “…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
    Get full text
    Get full text
    Article
  5. 5

    Algorithm for Identifying Minimum Driver Nodes Based on Structural Controllability by Reza, Haghighi, HamidReza, Namazi

    Published 2015
    “…Consequently, a simple graph-based algorithm is presented to obtain the minimum driver nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Scalable workflow scheduling algorithm for minimizing makespan and failure probability by Abdul Aziz, Maslina, Ninggal, Izuan Hafez

    Published 2019
    “…In order to analyse the performance of the FAWS algorithm, it will be compared with the popular scheduling algorithm namely Heterogeneous Earliest Finish Time (or HEFT) and Critical Path (CP). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…Secondly, specification language, system design, mathematical and computational models for IPS and SH system are established, which are based upon nonlinear classification, prevention predictability trust, analysis, self-adaptation and self-healing algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Two Stages Transfer Algorithm (TSTT) for independent tasks scheduling in heterogeneous computing systems by Al-Qadhi, Abdulrahman K., Ariffin, Ahmad Alauddin, Latip, Rohaya, Abdul Hamid, Nor Asila Wati, Al-Zubaidi, Ammar S.

    Published 2018
    “…In this paper, a proposed new heuristic algorithm named Two Stages Tasks Transfer (TSTT) algorithm to enhance Tenacious Penalty Based scheduling (TPB) algorithm. …”
    Get full text
    Get full text
    Article
  9. 9

    Power system intentional islanding for different contingency scenarios using discrete optimization technique by Nur Zawani Binti Saharuddin

    Published 2023
    “…The performance of the proposed MDEP algorithm was evaluated using the IEEE 30-bus, IEEE 39-bus, and IEEE 118-bus test systems. …”
    text::Thesis
  10. 10

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…LUC cryptosystem algorithm based on the quadratic and cubic polynomial, is introduced in this thesis with a new formula to distinguishing between the cubic polynomial roots. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Adopting search-based algorithms for pairwise testing by Abdullah, Nasser, Alsewari, Abdulrahman A., Kamal Z., Zamli

    Published 2015
    “…This paper presents a critical comparison of Search-Based algorithm for generating the pairwise test suite. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E by Oad, Aneel

    Published 2013
    “…The acquired results have proven that the proposed algorithms have successfully enhanced the legacy hybrid and the deadline based algorithm.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Solving transcendental equation using genetic algorithm / Masitah Hambari by Masitah , Hambari

    Published 2004
    “…The most critical task for developing this project is how to encode the algorithm based on the domain, Transcendental Equation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system by Balla, Asaad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Mubarak, Sinil

    Published 2022
    “…These methods could be hardware-based, such as Intrusion Detection Systems (IDS), software-based, or managerial-based. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A block-based multi-scale background extraction algorithm by Davarpanah, Seyed Hashem, Khalid, Fatimah, Golchin, Maryam

    Published 2010
    “…Problem statement: To extract the moving objects, vision-based surveillance systems subtract the current image from a predefined background image. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…The quantitative results obtained demonstrated improvements in terms of delay and jitter with an average of 68.49% and 44.87% respectively. Based on these, it is proven that the algorithm with contextual aware performs better for delay and jitter while maintaining the throughput as compared to the algorithm without contextual aware.…”
    text::Thesis
  19. 19

    Genetic algorithm fuzzy logic for medical knowledge-based pattern classification by Tan C.H., Tan M.S., Chang S.-W., Yap K.S., Yap H.J., Wong S.Y.

    Published 2023
    “…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
    Article
  20. 20

    Exact parallel plurality voting algorithm for totally ordered object space fault-tolerant systems by Karimi, Abbas, Zarafshan, Faraneh, Jantan, Adznan, Ramli, Abdul Rahman, Saripan, M. Iqbal, Syed Mohamed, Syed Abdul Rahman Al-Haddad

    Published 2012
    “…Plurality voter is one of the commonest voting methods for decision making in highly-reliable applications in which the reliability and safety of the system is critical. To resolve the problem associated with sequential plurality voter in dealing with large number of inputs, this paper introduces a new generation of plurality voter based on parallel algorithms. …”
    Get full text
    Get full text
    Get full text
    Article