Search Results - (( based application between algorithm ) OR ( spider optimization strategy algorithm ))*
Search alternatives:
- spider optimization »
- strategy algorithm »
- based application »
- between algorithm »
-
1
Spider wasp optimizer-optimized cascaded fractional-order controller for load frequency control in a photovoltaic-integrated two-area system
Published 2024“…Additionally, this study benchmarks the SWO-tuned controller against recently reported control strategies that were optimized using different algorithms. …”
Get full text
Get full text
Get full text
Article -
2
-
3
ScannerVision: Scanner-based image acquisition of medically important arthropods for the development of computer vision and deep learning models
Published 2025“…Using different strategies to place the arthropods on a charge-coupled device (CCD) flatbed scanner and optimized settings that balance processing time and image quality, we captured high-resolution images of various arthropods and obtained morphological details with resolution and magnification similar to a stereomicroscope. …”
Get full text
Get full text
Get full text
Article -
4
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…On the second level, TOPSIS algorithm allocates resources among an application’s user based on their criteria and the application’s preferences. …”
Get full text
Get full text
Thesis -
5
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…The algorithm is based on PTCOT (Parametric Theorem and Circle Overlapping Test) between two UAVs. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…Lastly, a comparison is made through simulation between all algorithms developed in this research with previous Zero-based algorithms as well as traditional Heuristic algorithms since equal routing results can be obtained between all algorithms. …”
Get full text
Get full text
Thesis -
9
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
10
Document clustering based on firefly algorithm
Published 2015Get full text
Get full text
Get full text
Article -
11
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…The suggestion is made based on matching between the buyer’s preferences and house properties.. …”
Get full text
Get full text
Thesis -
13
-
14
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…Algorithms for mutual exclusion in DS are categorized into two main classes including token-based and permission-based algorithms. …”
Get full text
Get full text
Thesis -
15
Rule-Based Multi-State Gravitational Search Algorithm for Discrete Optimization Problem
Published 2015Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
An FPGA implementation and performance analysis between radix-2 and radix-4 of 4096 point FFT
Published 2018“…Memory-based architecture adopted for the all algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
17
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
18
A Multi-State Gravitational Search Algorithm for Combinatorial Optimization Problems
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
20
A Rule Extraction Algorithm That Scales Between Fidelity and Comprehensibility
Published 2012“…Since the needs of comprehensibility or fidelity may vary depending on the user or application, this paper presented a significance based rule extraction algorithm that allows a user set parameter to scale between the desired degree of fidelity and comprehensibility of the rules extracted. …”
Get full text
Get full text
Get full text
Article
