Search Results - critical ((system algorithm) OR (based algorithm))
Search alternatives:
- system algorithm »
-
1
Indoor global path planning based on critical cells using dijkstra algorithm
Published 2015“…Path planning has been implemented in various robotics systems, and the results checked. This paper proposes global path planning based on grids representation in an indoor environment using Dijkstra algorithm. …”
Get full text
Get full text
Article -
2
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…This method makes a tradeoff between token-based and permission-based. It does not utilize any token, that is similar to permission-based, and the latest node having the critical section influences the entrance of the next node to the critical section, that is similar to token-based algorithms. …”
Get full text
Get full text
Thesis -
3
Feature-based face recognition system using utilized artificial neural network
Published 2010“…The proposed automatic feature-based face recognition system has efficiency more than 95% under the stated critical conditions. …”
Get full text
Thesis -
4
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2018“…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
Get full text
Get full text
Article -
5
Algorithm for Identifying Minimum Driver Nodes Based on Structural Controllability
Published 2015“…Consequently, a simple graph-based algorithm is presented to obtain the minimum driver nodes. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Scalable workflow scheduling algorithm for minimizing makespan and failure probability
Published 2019“…In order to analyse the performance of the FAWS algorithm, it will be compared with the popular scheduling algorithm namely Heterogeneous Earliest Finish Time (or HEFT) and Critical Path (CP). …”
Get full text
Get full text
Get full text
Get full text
Article -
7
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…Secondly, specification language, system design, mathematical and computational models for IPS and SH system are established, which are based upon nonlinear classification, prevention predictability trust, analysis, self-adaptation and self-healing algorithms. …”
Get full text
Get full text
Thesis -
8
Two Stages Transfer Algorithm (TSTT) for independent tasks scheduling in heterogeneous computing systems
Published 2018“…In this paper, a proposed new heuristic algorithm named Two Stages Tasks Transfer (TSTT) algorithm to enhance Tenacious Penalty Based scheduling (TPB) algorithm. …”
Get full text
Get full text
Article -
9
Power system intentional islanding for different contingency scenarios using discrete optimization technique
Published 2023“…The performance of the proposed MDEP algorithm was evaluated using the IEEE 30-bus, IEEE 39-bus, and IEEE 118-bus test systems. …”
text::Thesis -
10
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…LUC cryptosystem algorithm based on the quadratic and cubic polynomial, is introduced in this thesis with a new formula to distinguishing between the cubic polynomial roots. …”
Get full text
Get full text
Thesis -
11
Adopting search-based algorithms for pairwise testing
Published 2015“…This paper presents a critical comparison of Search-Based algorithm for generating the pairwise test suite. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E
Published 2013“…The acquired results have proven that the proposed algorithms have successfully enhanced the legacy hybrid and the deadline based algorithm.…”
Get full text
Get full text
Thesis -
13
Solving transcendental equation using genetic algorithm / Masitah Hambari
Published 2004“…The most critical task for developing this project is how to encode the algorithm based on the domain, Transcendental Equation. …”
Get full text
Get full text
Thesis -
14
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…These methods could be hardware-based, such as Intrusion Detection Systems (IDS), software-based, or managerial-based. …”
Get full text
Get full text
Get full text
Article -
15
A block-based multi-scale background extraction algorithm
Published 2010“…Problem statement: To extract the moving objects, vision-based surveillance systems subtract the current image from a predefined background image. …”
Get full text
Get full text
Article -
16
Consumption-Based Priority Algorithm for Energy Consumption
Published 2024“…The secret to creating energy-efficient processes is creating rules based on energy consumption priority algorithms. …”
Get full text
Get full text
Get full text
Article -
17
Consumption-Based Priority Algorithm for Energy Consumption
Published 2024“…The secret to creating energy-efficient processes is creating rules based on energy consumption priority algorithms. …”
Get full text
Get full text
Get full text
Article -
18
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…The quantitative results obtained demonstrated improvements in terms of delay and jitter with an average of 68.49% and 44.87% respectively. Based on these, it is proven that the algorithm with contextual aware performs better for delay and jitter while maintaining the throughput as compared to the algorithm without contextual aware.…”
text::Thesis -
19
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2023“…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
Article -
20
Exact parallel plurality voting algorithm for totally ordered object space fault-tolerant systems
Published 2012“…Plurality voter is one of the commonest voting methods for decision making in highly-reliable applications in which the reliability and safety of the system is critical. To resolve the problem associated with sequential plurality voter in dealing with large number of inputs, this paper introduces a new generation of plurality voter based on parallel algorithms. …”
Get full text
Get full text
Get full text
Article
