Search Results - (( based encryption path algorithm ) OR ( based optimization mead algorithm ))
Search alternatives:
- optimization mead »
- path algorithm »
- mead algorithm »
-
1
A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network
Published 2024“…Results: Simulation results perfectly showed that the suggested localization algorithm based on NMM can carry out a better performance than that of other localization algorithms utilizing other op- timization approaches, including a particle swarm optimization, ant colony (ACO) and bat algorithm (BA). …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Optimized PID controller of DC-DC buck converter based on archimedes optimization algorithm
Published 2023“…The proposed PID controller, optimized using AOA, is contrasted with PID controllers tuned via alternative algorithms including the hybrid Nelder-Mead method (AEONM), artificial ecosystem-based optimization (AEO), differential evolution (DE), and particle swarm optimizer (PSO). …”
Get full text
Get full text
Get full text
Article -
3
-
4
Single and Multiple variables control using Tree Physiology Optimization
Published 2017“…The proposed algorithm is also compared with deterministic gradient-free algorithm: Nelder-Mead simplex (NMS) and another metaheuristic algorithm: Particle Swarm Optimization (PSO). …”
Get full text
Get full text
Article -
5
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
6
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
7
Image orientation watermarking technique for copyright protection
Published 2016“…In return, a copyright gains its validity based on such robust characteristics. Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
Get full text
Get full text
Get full text
Thesis
