Search Results - (( mobile application bat algorithm ) OR ( some applications using algorithm ))*
Search alternatives:
- applications using »
- some applications »
- application bat »
- using algorithm »
- bat algorithm »
-
1
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
2
PID controller design for mobile robot using Bat Algorithm with Mutation (BAM)
Published 2019“…Here, an optimization algorithm called Bat Algorithm with Mutation (BAM) is proposed to optimize the value of PID controller gain for mobile robot. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Multi-Robot Learning with Bat Algorithm With Mutation (Bam)
Published 2022“…BAT algorithm is implemented to achieve the target. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…To address relay node selection and data scheduling issues, Energy-Efficient Scheduling (EES) and Energy-Efficient Un-Scheduling (EEUS) methods have been introduced using the Improved Discrete Bat Algorithm (IDBA) along with the Adaptive Warshal Floyd algorithm (AWF). …”
Get full text
Get full text
Get full text
Thesis -
5
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…Thus, it can be concluded that QEEA algorithm is the most energy efficient and the best candidate for provisioning the QoS for the real time (RT) and non-real time (NRT) applications.…”
Get full text
Get full text
Thesis -
6
-
7
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
8
-
9
VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE
Published 2013“…ICA algorithm does vast computations thus; ICA algorithm is used to improve segmentation performance. …”
Get full text
Get full text
Final Year Project -
10
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
14
Wind farm reactive power optimization by using imperialist competitive algorithm
Published 2013“…In this paper, the reactive power consumption of a wind turbine is optimized by using (ICA) method. To illustrate the application of the method, a wind farm with some uncertainties is provided. …”
Get full text
Get full text
Conference or Workshop Item -
15
A block-based multi-scale background extraction algorithm
Published 2010“…Conclusion: Using Multi scaling filtering and applying the filters just to some selected nonoverlapped blocks reduce the time consumption of the extracting background algorithm. …”
Get full text
Get full text
Article -
16
Test Data Generation for Event Driven System Using Bees Algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
17
Wind Farm Reactive Power Optimization by Using Imperialist Competitive Algorithm
Published 2013“…In this paper, the reactive power consumption of a wind turbine is optimized by using (ICA) method. To illustrate the application of the method, a wind farm with some uncertainties is provided. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
19
The fusion of particle swarm optimization (PSO) and interior point method (IPM) as cooperative movement control algorithm in Swarm Robotics / Dada Emmanuel Gbenga
Published 2016“…It is demonstrated in the literature that methods that hybridize PSO and some other optimisation algorithm have a better performance over the standard PSO algorithm. …”
Get full text
Get full text
Thesis -
20
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers
