Search Results - (( colony optimization mead algorithm ) OR ( based instruction security algorithm ))
Search alternatives:
- instruction security »
- optimization mead »
- mead algorithm »
-
1
A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network
Published 2024“…Results: Simulation results perfectly showed that the suggested localization algorithm based on NMM can carry out a better performance than that of other localization algorithms utilizing other op- timization approaches, including a particle swarm optimization, ant colony (ACO) and bat algorithm (BA). …”
Get full text
Get full text
Get full text
Get full text
Article -
2
RISC-V instruction set extension on blockchain application
Published 2024“…This project is an instruction set extension project based on RISC-V architecture for academic purpose. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
Get full text
Get full text
Get full text
Thesis -
4
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
5
Development of IoT-based automated dynamic emergency response system against fire incidents in academic building
Published 2023“…Overall, the proposed system aims to improve the safety and security through real-time monitoring and response capabilities. …”
Get full text
Get full text
Get full text
Get full text
Article
