Search Results - (( mobile applications ant algorithm ) OR ( some application using algorithm ))*
Search alternatives:
- mobile applications »
- applications ant »
- some application »
- using algorithm »
- ant algorithm »
-
1
-
2
AntNet: a robust routing algorithm for data networks
Published 2004Get full text
Get full text
Get full text
Article -
3
Autonomous mobile robots path planning with integrative edge cloud-based ant colony optimization
Published 2025“…In recent years, Automated Mobile Robots (AMRs) have gained significant attention in industry and research applications, requiring efficient path-planning algorithms to optimize task performance. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. In this paper, an ant colony optimization (ACO) based WSN routing algorithm for IoT has been proposed and analyzed to enhance scalability, to accommodate node mobility and to minimize initialization delay for time critical applications in the context of IoT to find the optimal path of data transmission, improvising efficient IoT communications. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Energy-efficient scalable routing protocol based on ACO for WSNS
Published 2019“…To overcome the existing problem of accommodating node mobility, reducing initialization time for ant based routing algorithm and to maintain scalability in WSN for time critical applications, an ACO based WSN routing algorithm has been proposed and analyzed in this paper. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Cloud-Mobi Framework using hybrid AHP-ACO method for Social Interaction and Travel Planning
Published 2013“…Advances in technology especially mobile computing has encouraged various travel recommendation applications to flourish in the market. …”
Get full text
Get full text
Conference or Workshop Item -
7
A noble approach of ACO algorithm for WSN
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
A review : On intelligent mobile robot path planning techniques
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Exploring optimal resource allocation methods for improved efficiency in flying ad-hoc network environments: a survey
Published 2024“…This survey reviews various optimization techniques, including genetic algorithms, ant colony optimization, and artificial neural networks, which optimize resource allocation by considering mission requirements, network topology, and energy constraints. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…In order to achieve this, different sets of trust information including QoS, OSNs and ant colony system (ACS) algorithm are proposed to improve the selection of trustworthy node. …”
Get full text
Get full text
Get full text
Thesis -
13
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
14
-
15
VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE
Published 2013“…ICA algorithm does vast computations thus; ICA algorithm is used to improve segmentation performance. …”
Get full text
Get full text
Final Year Project -
16
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
20
Wind farm reactive power optimization by using imperialist competitive algorithm
Published 2013“…In this paper, the reactive power consumption of a wind turbine is optimized by using (ICA) method. To illustrate the application of the method, a wind farm with some uncertainties is provided. …”
Get full text
Get full text
Conference or Workshop Item
