Search Results - (( from location based algorithm ) OR ( its application based algorithm ))*
Search alternatives:
- application based »
- its application »
- from location »
-
1
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Opposition-based spiral dynamic algorithm with an application to optimize type-2 fuzzy control for an inverted pendulum system
Published 2022“…Spiral Dynamic Algorithm (SDA) is a group-based optimization algorithm formulated based on the concept of a natural spiral phenomenon on earth. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article -
4
Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement
Published 2011“…This thesis present a genetic algorithm based method for placement of FACTS devices for voltage profile improvement. …”
Get full text
Get full text
Thesis -
5
-
6
An enhanced distance vector-hop algorithm using new weighted location method for wireless sensor networks
Published 2020“…In the final phase, least squares are employed to address nonlinear equation, which will gain greater location errors. Aimed at addressing problems mentioned above, an enhanced DV-Hop algorithm based on weighted factor, along with new weighted least squares location technique, is proposed in this paper, and it is called WND-DV-Hop. …”
Get full text
Get full text
Get full text
Article -
7
Solving vehicle routing problem by using improved K-nearest neighbor algorithm for best solution
Published 2017“…Approach: The approach has been presented based on two phases: firstly, the algorithms have been adapted to solve the research problem, where its procedure is different than the common algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
Get full text
Get full text
Thesis -
9
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…The proposed algorithm is simulated for simultaneous OPF-based conflicting objectives, respectively. …”
Get full text
Get full text
Thesis -
10
Smart surveillance system based on stereo matching algorithms with IP and PTZ cameras
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Agreement options for negotiation on material location decision of housing development
Published 2020“…A support model enables negotiation process in group decision. Decision algorithms are based on the cooperative game theory to develop the agreement options and coalition formation. …”
Get full text
Get full text
Article -
12
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…The selection of this parameter is based on the application requirements. Minimal Constrained Rendezvous Node (MCRN) algorithm is designed to ensure that the number of pause locations for the mobile element is minimized. …”
Get full text
Get full text
Thesis -
13
Pengesanan nombor plat kenderaan menggunakan alkhwarizmi gugusan dan kelancaran jarak larian(GKJL)
Published 2009“…A new algorithm called Cluster Run Length Smoothing Algorithm (CRLSA) approach was applied to locate the license plate at the right position. …”
Get full text
Get full text
Get full text
Article -
14
Dynamic positioning base station for wireless sensor network using particle swarm optimization (PSO)
Published 2012“…The base station is normally located far from the sensing area. …”
Get full text
Thesis -
15
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
16
A hybrid algorithm of source localization based on hyperbolic technique in WSN
Published 2014“…It is therefore important to estimate a source position that minimizes its deviations from the actual position. In this paper, a hybrid method combined with maximum likelihood (ML) and genetic algorithm (GA) are proposed to determine the instantaneous position of the moving source by estimating the position and velocity based on hyperbolic techniques (TDOA and FDOA). …”
Get full text
Get full text
Conference or Workshop Item -
17
Donatenow: a crowdsourcing-based mobile application with geolocation and content-based filtering algorithm / Siti Rahayu Abdul Aziz and Nur Aqilah Balkis Hafiz Abu Bakar
Published 2023“…The profound significance of the DonateNow application lies in its potential to bring about a transformational impact. …”
Get full text
Get full text
Book Section -
18
Donatenow: a crowdsourcing-based mobile application with geolocation and content-based filtering algorithm / Siti Rahayu Abdul Aziz and Nur Aqilah Balkis Hafiz Abu Bakar
Published 2023“…The profound significance of the DonateNow application lies in its potential to bring about a transformational impact. …”
Get full text
Get full text
Book Section -
19
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
Get full text
Get full text
Get full text
Thesis -
20
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item
