Search Results - (( data optimization ((method algorithm) OR (path algorithm)) ) OR ( data evaluation a algorithm ))
Search alternatives:
- data optimization »
- method algorithm »
- data evaluation »
- path algorithm »
- evaluation a »
- a algorithm »
-
1
An Experiment of Ant Algorithms : Case Study of Kota Kinabalu Central Town
Published 2005“…There are many algorithms that used to solve this problem. In this study, ant algorithms are used to find the shortest path using a real data. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…In order to generate optimal data to satisfy whole constraints in the feasible path, new method with SBTs is necessary to satisfy the whole constraints at the same time of the whole path executing. …”
Get full text
Get full text
Get full text
Thesis -
4
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…Compared to the Ant Colony Optimization-Genetic Algorithm (ACO-GA) and Ant Colony Optimization- Hierarchical Clustering Mechanism (ACOHCM), the ACO algorithm shows superior power savings and efficiency. …”
Get full text
Get full text
Get full text
Thesis -
5
Successor selection for Ant Colony Optimization technique algorithm / Muhammad Iskandar Isman
Published 2017“…Therefore, in this research, will be use Ant Colony Optimization (ACO) algorithm as an optimize technique that provide a shortest path of defining a successor that is their highest value of criteria. …”
Get full text
Get full text
Thesis -
6
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…A new mutation vector inspired by the two-opposite path (2-Opt) algorithm with adaptive mutation scalar (F ) and crossover rate (CR) control parameters were employed to enhance the exploration and exploitation phases of the proposed algorithm. …”
Get full text
Get full text
Thesis -
7
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail
Published 2017“…The input data of this project is retrieved from the game’s rule itself and implemented with the proposed algorithm which is A* algorithm. …”
Get full text
Get full text
Thesis -
9
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…An enhanced security algorithm is developed on top of MIPv6 RO to secure data. …”
Get full text
Get full text
Conference or Workshop Item -
10
Transformation path of modern media from the perspective of internet of things
Published 2022“…To improve the security of the data, we propose Robust Modern Media Data Encryption (RMMDE) algorithm with Enhance Cuckoo Swarm Optimization (ECSO) algorithm. …”
Get full text
Get full text
Article -
11
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…In this paper, focus is given on enhanced security scheme in terms of RO based Test-bed evaluation experiment. An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare a safe communication between MN and CN. …”
Get full text
Get full text
Get full text
Article -
12
Using artificial intelligence search in solving the camera placement problem
Published 2022“…Two case studies are used to evaluate those algorithms, and the camera placement problem is formulated as a coverage maximization problem. …”
Get full text
Get full text
Book -
13
Comprehensive review of drones collision avoidance schemes: challenges and open issues
Published 2024“…We explore collision avoidance methods for UAVs from various perspectives, categorizing them into four main groups: obstacle detection and avoidance, collision avoidance algorithms, drone swarm, and path optimization. …”
Get full text
Get full text
Get full text
Article -
14
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…Furthermore, the approach is extended with a Particle Swarm Algorithm (PSO) and presented as a hybrid RASCP to validate the optimal location and number of controllers. …”
Get full text
Get full text
Thesis -
15
Optimization Method Using Modified Harmony Search For Coverage And Energy Efficiency In Wireless Sensor Network
Published 2018“…Coverage and energy efficiency metrics are two fundamental issues for almost all types of application in wireless sensor network (WSNs).Coverage reflects how well an area is monitored by sensor nodes and in energy efficient networks where less energy is consumed to provide the same level of services.These twin specifics are presented to evaluate the performance of a wireless sensor network.Due to its simplicity and ease of analysis,full coverage is widely implemented in many theoretical studies.However,sometimes full coverage is not the best way to represent some real-world application due to its strong restrictions and its deterministic characteristics.In this thesis,Modified Harmony Search algorithm (MHS) is proposed to achieve a sensor node deployment such that the covered area is optimal and data transfer has low energy consumption.Through computer simulations, experimental results verified that the proposed method improved the coverage of area in compare to some related methods.Based on the result obtain from every experiments,coverage area percentage performance is affected by the number of hotspots.This is shown by Harmony Search (HS) based method where the coverage area percentage increases as the number of hotspot increase. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…To fill this gap, a comprehensive survey is conducted using the mixed-method systematic literature review involving qualitative and quantitative data from the studied papers. …”
Get full text
Get full text
Article -
17
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Several experiments were carried out using the OMNeT++ simulation framework. The designed algorithm was evaluated using experimental data. The obtained results show that the continuous in-band overlay path probing algorithm (COPPA) provides up-to-date bandwidth information with reduced overhead and minimal impact on the traffic of the path.…”
Get full text
Get full text
Thesis -
18
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The results demonstrated that the proposed method could generate an optimal collision-free path. …”
Get full text
Thesis -
19
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024Get full text
Get full text
Get full text
Conference or Workshop Item -
20
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…Wireless sensor networks operate through commonly self-organized sensor nodes to transfer data in a multi-hop approach to a central sink. In order to support fine-grained diagnostic analysis and optimize the performance level of the networks, the reconstruction of per-packet routing path is essential. …”
Get full text
Get full text
Thesis
