Search Results - (( data optimization method algorithm ) OR ( data evaluation path algorithm ))

Refine Results
  1. 1
  2. 2

    An Experiment of Ant Algorithms : Case Study of Kota Kinabalu Central Town by Nor Rafidah, Mohamad

    Published 2005
    “…There are many algorithms that used to solve this problem. In this study, ant algorithms are used to find the shortest path using a real data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…In order to generate optimal data to satisfy whole constraints in the feasible path, new method with SBTs is necessary to satisfy the whole constraints at the same time of the whole path executing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…Pheromone trails mark efficient routes, reinforcing paths with higher pheromone concentrations. This optimizes data transmission, enhances energy efficiency, and extends network longevity. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Successor selection for Ant Colony Optimization technique algorithm / Muhammad Iskandar Isman by Isman, Muhammad Iskandar

    Published 2017
    “…ACO algorithm is the best solution because it included the optimization technique to optimized the result based on the data criteria needs. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…Secondly, the modeling method of the proposed PV module is validated by experimental data. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…In this paper, focus is given on enhanced security scheme in terms of RO based Test-bed evaluation experiment. An enhanced security algorithm is developed on top of MIPv6 RO to secure data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Transformation path of modern media from the perspective of internet of things by Yujie, Zhang, Yasin, Megat Al Imran, AlSagoff, Syed Agil, Ang, Lay Hoon

    Published 2022
    “…To improve the security of the data, we propose Robust Modern Media Data Encryption (RMMDE) algorithm with Enhance Cuckoo Swarm Optimization (ECSO) algorithm. …”
    Get full text
    Get full text
    Article
  9. 9

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail by Ismail, Zafhira

    Published 2017
    “…Hence, this project is focused more on optimizing the problems to minimize number of moves to achieve game’s goal. The input data of this project is retrieved from the game’s rule itself and implemented with the proposed algorithm which is A* algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimization Method Using Modified Harmony Search For Coverage And Energy Efficiency In Wireless Sensor Network by Halim, Nurul Hamimi

    Published 2018
    “…However,the sink node position and size of data transmitted will not affect the performance of coverage area.This is because the coverage area value is fluctuated as the parameters value increases.Throughout the experiment conducted,sensor nodes deployed using Modified Harmony Search algorithm (MHS) gives better coverage area compared to other existing methods.The average coverage area percentage obtained by Modified Harmony Search is 63 %.The average coverage area percentage obtained by Modified Random is 48 % and the average coverage area percentage obtained by Harmony Search is 46 %.The highest coverage area recorded for Modified Harmony Search is 70 %.To enhance the energy efficiency,shortest path distance finder is added to each method.Throughout the research,Modified Harmony Search with shortest path distance finder gives optimum results.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Using artificial intelligence search in solving the camera placement problem by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P.

    Published 2022
    “…Following the coverage modeling, an optimization method needs to be used to locate the optimal poses and/or camera positions. …”
    Get full text
    Get full text
    Book
  14. 14

    Comprehensive review of drones collision avoidance schemes: challenges and open issues by Rezaee, Mohammad Reza, Abdul Hamid, Nor Asilah Wati, Hussin, Masnida, Ahmad Zukarnain, Zuriati

    Published 2024
    “…We explore collision avoidance methods for UAVs from various perspectives, categorizing them into four main groups: obstacle detection and avoidance, collision avoidance algorithms, drone swarm, and path optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…Extensive computations utilizing MATLAB 2018a on the Intel Core i7/Gen 10 processor and 16 GB of RAM are used to evaluate the algorithm efficacy. According to the blueprint of our heuristic method, the allocation and the optimum number of controllers under an effective decentralized policy could achieve higher efficiency. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions by Akhlaqi, Mohammad Yahya, Mohd Hanapi, Zurina

    Published 2023
    “…For each journal paper, the detailed information of the work area, targeted issue, formulation technique, optimization approach, adopted algorithms, evaluation techniques, performance matrices, dataset, utilized tools, and framework are extracted and analyzed using manual and automatic coding. …”
    Get full text
    Get full text
    Article
  20. 20

    Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller by Zaridah, Mat Zain

    Published 2010
    “…This algorithm encode a potential solution to a specific problem on a simple chromosome like data structure and apply recombination operators to this structure to preserve critical information. …”
    Get full text
    Thesis