Search Results - (( its location based algorithm ) OR ( some application ((max algorithm) OR (bat algorithm)) ))
Search alternatives:
- some application »
- max algorithm »
- bat algorithm »
- its location »
-
1
Application of adaptive bats sonar algorithm to minimise car side impact design
Published 2017“…This project was focusing on the modification of bats sonar algorithm (BSA) and renamed to adaptive bats sonar algorithm (ABSA) due to some limitations of previous algorithm. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…Three different optimization algorithms which are Bat Algorithm (BA), Bat Algorithm with Mutation (BAM) and Extended Bat Algorithm (EBA) are implemented to optimize the value of PID controller gain for wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
3
-
4
PID controller design for mobile robot using Bat Algorithm with Mutation (BAM)
Published 2019“…Here, an optimization algorithm called Bat Algorithm with Mutation (BAM) is proposed to optimize the value of PID controller gain for mobile robot. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems
Published 2016“…These problems motivated to propose Max Degres Around (MDA) approximation algorithm for the MVC problem. …”
Get full text
Get full text
Get full text
Article -
6
A comparative performance analysis of computational intelligence techniques to solve the asymmetric travelling salesman problem
Published 2021“…This paper presents a comparative performance analysis of some metaheuristics such as the African Buffalo Optimization algorithm (ABO), Improved Extremal Optimization (IEO), Model-Induced Max-Min Ant Colony Optimization (MIMM-ACO), Max-Min Ant System (MMAS), Cooperative Genetic Ant System (CGAS), and the heuristic, Randomized Insertion Algorithm (RAI) to solve the asymmetric Travelling Salesman Problem (ATSP). …”
Get full text
Get full text
Get full text
Article -
7
Benchmarking of Bat-inspired Interaction Testing Strategy
Published 2016Get full text
Get full text
Get full text
Article -
8
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…In the proposed HATSC scheme, the AHP method is uese for criteria weighting, while the TOPSIS method uses for the selection technique based on a multi-criteria decision-making algorithm is proposed. This enables it to meet the MS application requirements based on some criteria such as CINR, BW, and delay. …”
Get full text
Get full text
Thesis -
9
-
10
A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed
Published 2014“…The WiMAX network does not provide sufficient QoS with respect to Application Response Time. …”
Get full text
Get full text
Conference or Workshop Item -
11
Modified damage location indices in beam-like structure: Analytical study
Published 2011“…The modified algorithms are able to detect the damage wherever its location, applying even to cases of multi damage locations. …”
Get full text
Get full text
Article -
12
Two-dimensional burst construction with QoS assurance for OFDMA mobile WiMAX system
Published 2014Get full text
Get full text
Conference or Workshop Item -
13
-
14
-
15
-
16
Review of Multi-Objective Swarm Intelligence Optimization Algorithms
Published 2021Get full text
Get full text
Article -
17
-
18
Autonomous path planning robot using geographical information
Published 2008“…The guidance algorithm is formed based on an initial direction and distance of the target location without considering the time taken by the robot to reach the desired destination. …”
Get full text
Learning Object -
19
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article
