Search Results - (( based ((application new) OR (application a)) algorithm ) OR ( its location based algorithm ))
Search alternatives:
- application new »
- application a »
- its location »
-
1
A coordinated design of PSSs and UPFC-based stabilizer using Genetic Algorithm
Published 2013Get full text
Conference or Workshop Item -
2
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article -
4
An enhanced distance vector-hop algorithm using new weighted location method for wireless sensor networks
Published 2020“…In the final phase, least squares are employed to address nonlinear equation, which will gain greater location errors. Aimed at addressing problems mentioned above, an enhanced DV-Hop algorithm based on weighted factor, along with new weighted least squares location technique, is proposed in this paper, and it is called WND-DV-Hop. …”
Get full text
Get full text
Get full text
Article -
5
Application of genetic algorithm in optimization of unified power flow controller parameters and its location in the power system network
Published 2013“…This work demonstrates the application of Genetic Algorithm (GA) technique for the simultaneous stabilization of power systems using a Unified Power Flow Controller (UPFC). …”
Get full text
Get full text
Article -
6
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
Get full text
Get full text
Thesis -
7
Data clustering using the bees algorithm
Published 2007“…The main problem with this clustering method is its tendency to converge to local optima. The authors’ team have developed a new population based search algorithm called the Bees Algorithm that is capable of locating near optimal solutions efficiently. …”
Get full text
Get full text
Conference or Workshop Item -
8
Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau
Published 2020“…The advantages of AR-based FLP approach over the other approaches are the shorter time taken to build its model and its flexibility in the design modification. …”
Get full text
Get full text
Get full text
Thesis -
9
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…Finally, a crowding distance and non-dominated-sorting-based multi-objective hybrid firefly & particle swarm optimization (MOHFPSO) algorithm is designed for MOOPF problems. …”
Get full text
Get full text
Thesis -
10
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem
Published 2008“…This research explored and developed new heuristics based on GA for solving VRPSD. New algorithms, journal papers and computerized system were also developed. …”
Get full text
Get full text
Monograph -
13
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
Get full text
Get full text
Final Year Project -
14
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
15
Opposition-based spiral dynamic algorithm with an application to optimize type-2 fuzzy control for an inverted pendulum system
Published 2022“…Spiral Dynamic Algorithm (SDA) is a group-based optimization algorithm formulated based on the concept of a natural spiral phenomenon on earth. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Performance Enhancement Of Artificial Bee Colony Optimization Algorithm
Published 2013“…To overcome the problems, this research work has proposed few modified and new ABC variants; Gbest Influenced-Random ABC (GRABC) algorithm systematically exploits two different mutation equations for appropriate exploration and exploitation of search-space, Multiple Gbest-guided ABC (MBABC) algorithm enhances the capability of locating global optimum by exploiting so-far-found multiple best regions of a search-space, Enhanced ABC (EABC) algorithm speeds up exploration for optimal-solutions based on the best so-far-found region of a search-space and Enhanced Probability-Selection ABC (EPS-ABC) algorithm, a modified version of the Probability-Selection ABC algorithm, simultaneously capitalizes on three different mutation equations for determining the global-optimum. …”
Get full text
Get full text
Thesis -
17
A fault syndromes simulator for random access memories
Published 2008“…This algorithm also allows the faults to be located and identified. …”
Get full text
Get full text
Article -
18
Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement
Published 2011“…This thesis present a genetic algorithm based method for placement of FACTS devices for voltage profile improvement. …”
Get full text
Get full text
Thesis -
19
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
20
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis
