Search Results - (( data optimization system algorithm ) OR ( data virtualization path algorithm ))
Search alternatives:
- optimization system »
- data virtualization »
- virtualization path »
- data optimization »
- system algorithm »
- path algorithm »
-
1
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…The multi-criterion energyefficient routing mechanism uses the ACO algorithm, inspired by ants' foraging behaviour. In Bluetooth M-LPNWSN systems, virtual ants explore paths based on signal robustness, distances, and energy consumption. …”
Get full text
Get full text
Get full text
Thesis -
2
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…Furthermore, the approach is extended with a Particle Swarm Algorithm (PSO) and presented as a hybrid RASCP to validate the optimal location and number of controllers. …”
Get full text
Get full text
Thesis -
3
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…The scheme showed better data delivery and lower average-end-to-end delay with good flooding efficiency. …”
Get full text
Get full text
Get full text
Thesis -
4
Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi
Published 2008“…Therefore, it is the aim of this study to conduct a research about the Dijsktra’s algorithm implementation for shortest path calculation in 3D environment. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison between multi-objective and single-objective optimization for the modeling of dynamic systems
Published 2013Get full text
Working Paper -
6
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…The data optimization algorithm uses the current data provided by the health department and then compare them with the patient’s data, after which the system will produce the current health status of the patient. …”
Get full text
Get full text
Book Section -
7
Algorithm development for optimization of a refrigeration system
Published 2010“…This thesis deals with algorithm development for optimization of a refrigeration system. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Development of decentralized data fusion algorithm with optimized kalman filter.
Published 2016“…This thesis proposes a data fusion model that facilitates selection of algorithm and recommends selected algorithm to be optimized. …”
Get full text
Get full text
Thesis -
9
Optimized PV-Battery Systems using Backtracking Search Algorithm for Sustainable Energy Solutions
Published 2024“…Employing the Backtracking Search Algorithm (BSA), the research optimizes PI controller parameters to enhance system efficiency and reliability. …”
Conference Paper -
10
A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system
Published 2021“…This algorithm will help an IMG system to operate its generation systems optimally and economically along with PV generation unit. …”
Get full text
Get full text
Article -
11
Hybridization of nonlinear sine cosine and safe experimentation dynamics algorithms for solving control engineering optimization problems
Published 2024“…The empirical assessment of these proposed methods encompasses a diverse set of 23 benchmark functions, demonstrating their efficacy comparable to well-established metaheuristic algorithms such as as the Grey Wolf Optimizer (GWO), Multi-Verse Optimization (MVO), Sine Cosine Algorithm (SCA), Ant Lion Optimizer (ALO), Moth-Flame Optimization Algorithm (MFO), and Grasshopper Optimization Algorithm (GOA). …”
Get full text
Get full text
Thesis -
12
Festive season balancing groceries optimization / Fairuz Mohamed Razi
Published 2012“…The most important part is during system design and implementation. In this phase, method use in Genetic Algorithm to optimize the system prototype is Rastrigin's function to calculate the fitness of the chromosomes.…”
Get full text
Get full text
Thesis -
13
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
14
Voting algorithms for large scale fault-tolerant systems
Published 2011“…In this research, we proposed optimal algorithms using Divide and Conquer, Brent’s theorem and parallel algorithms, appropriate for today’s large scale systems such as satellite processing systems, traffic control, weather forecasting which all face a large quantity of processing input data. …”
Get full text
Get full text
Thesis -
15
Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm
Published 2024“…This research introduces the improved Archimedes optimization algorithm (IAOA) for data-driven modeling of continuous-time Hammerstein models with missing data. …”
Get full text
Get full text
Get full text
Article -
16
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…In addition, ISSA was compared with four well-known optimization algorithms such as Genetic Algorithm, Particle Swarm Optimization, Grasshopper Optimization Algorithm, and Ant Lion Optimizer. …”
Get full text
Get full text
Article -
17
-
18
Optimization of handover algorithms in 3GPP long term evolution system
Published 2011“…Simulation results show that this optimization outperforms non-optimized algorithms by minimizing the average number of handovers per UE per second while maximizing average system throughput.…”
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…The architecture includes MD5 padding block, data path, and a controller. A general concept and implementation of the MD5 hash function is described. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
