Search Results - (( location application using algorithm ) OR ( whale optimization bees algorithm ))
Search alternatives:
- location application »
- whale optimization »
- optimization bees »
- using algorithm »
- bees algorithm »
-
1
Energy-aware scheduling optimization in hybrid flow shops using artificial bee colony algorithm
Published 2024“…Through an extensive computational experiment involving a well-known benchmark suite, the ABC algorithm demonstrated remarkable performance, consistently outperforming several popular metaheuristic algorithms, including Genetic Algorithms, Particle Swarm Optimization, Memetic Algorithms, and Whale Optimization Algorithm in 75% of the problems. …”
Get full text
Get full text
Get full text
Article -
2
Artificial neural networks based optimization techniques: A review
Published 2023“…In the last few years, intensive research has been done to enhance artificial intelligence (AI) using optimization techniques. In this paper, we present an extensive review of artificial neural networks (ANNs) based optimization algorithm techniques with some of the famous optimization techniques, e.g., genetic algorithm (GA), particle swarm optimization (PSO), artificial bee colony (ABC), and backtracking search algorithm (BSA) and some modern developed techniques, e.g., the lightning search algorithm (LSA) and whale optimization algorithm (WOA), and many more. …”
Review -
3
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…Location-based applications enabled by advances in sensing and tracking technology but it also create significant privacy risks. …”
Get full text
Get full text
Thesis -
4
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…There are numerous techniques presented by various researchers to protect the location-context of users. Location cloaking is an often used technique to protect location-contexts. …”
Get full text
Get full text
Article -
5
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…There are numerous techniques presented by various researchers to protect the location-context of users. Location cloaking is an often used technique to protect location-contexts. …”
Get full text
Get full text
Get full text
Article -
6
The child tracker using location awareness / Muhammad Idham Amdan
Published 2017“…The Child Tracker using Location Aware methods aims to provide user a very effective way to broadcast their location especially to their parents. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017“…This route-finding problem is one of the most important computer applications in the transportation industry. In network theory, it’s known as the shortest-path problem, and Dijkstra’s algorithm is usually used to solve it. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
Particle filter approach for tracking indoor user location using IEEE 802.11 signals
Published 2011“…This approach shows a promising result in tracking user location indoor using particle filter algorithm.…”
Get full text
Get full text
Get full text
Article -
13
Particle filter approach for estimating indoor mobile user location using IEEE 802.11 signals (F1090)
Published 2011“…This approach shows a promising result in tracking user location indoor using particle filter algorithm.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms
Published 2021“…Therefore, for the second objective, another algorithm named the fuzzy algorithm is designed which combines the clustering algorithm, matching algorithm, triangle area algorithm and average Euclidean algorithm used to estimate location. …”
Get full text
Get full text
Thesis -
15
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
17
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
18
Locating fault using voltage sags profile for underground distribution system
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Mobile user location prediction: genetic algorithm-based approach
Published 2010“…This paper presents a prediction of user location using genetic algorithm and based location history in finding a number of solutions of possible location when applied to recorded context histories, framework is presented and the result are discussed. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Fingerprint center point location using directional field
Published 2004Get full text
Get full text
Get full text
Book Section
