Search Results - (( based application between algorithm ) OR ( spider optimization strategy algorithm ))*

Refine Results
  1. 1

    Spider wasp optimizer-optimized cascaded fractional-order controller for load frequency control in a photovoltaic-integrated two-area system by Ekinci, Serdar, Izci, Davut, Turkeri, Cebrail, Mohd Ashraf, Ahmad

    Published 2024
    “…Additionally, this study benchmarks the SWO-tuned controller against recently reported control strategies that were optimized using different algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    ScannerVision: Scanner-based image acquisition of medically important arthropods for the development of computer vision and deep learning models by Ong, Song Quan, Nathan Pinoy, Lim, Min Hui, Kim Bjerge, Francisco Javier Peris-Felipo, Rob Lind, Jordan P. Cuff, Samantha M. Cook, Toke Thomas Høye

    Published 2025
    “…Using different strategies to place the arthropods on a charge-coupled device (CCD) flatbed scanner and optimized settings that balance processing time and image quality, we captured high-resolution images of various arthropods and obtained morphological details with resolution and magnification similar to a stereomicroscope. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…On the second level, TOPSIS algorithm allocates resources among an application’s user based on their criteria and the application’s preferences. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi by Nur Fadzilah, Mohamad Radzi

    Published 2013
    “…The algorithm is based on PTCOT (Parametric Theorem and Circle Overlapping Test) between two UAVs. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks by Raja Mohd Auzar, Tengku Dian Shahida

    Published 2009
    “…Lastly, a comparison is made through simulation between all algorithms developed in this research with previous Zero-based algorithms as well as traditional Heuristic algorithms since equal routing results can be obtained between all algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Compiler-based prefetching algorithm for recursive data structure by Anuar, Nurulhaini

    Published 2007
    “…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…The suggestion is made based on matching between the buyer’s preferences and house properties.. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…Algorithms for mutual exclusion in DS are categorized into two main classes including token-based and permission-based algorithms. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    A Rule Extraction Algorithm That Scales Between Fidelity and Comprehensibility by Muthu Anbananthen, Kalaiarasi Sonai, Chan, Fabian Huan Pheng*, Subramaniam, Subhacini, Eimad Eldin, Abdu Ali Abusham

    Published 2012
    “…Since the needs of comprehensibility or fidelity may vary depending on the user or application, this paper presented a significance based rule extraction algorithm that allows a user set parameter to scale between the desired degree of fidelity and comprehensibility of the rules extracted. …”
    Get full text
    Get full text
    Get full text
    Article