Search Results - (( mobile evaluation based algorithm ) OR ( whale optimization path algorithm ))*

Refine Results
  1. 1

    Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm by Machmudah, Affiani, Parman, Setyamartana, Abbasi, Aijaz, Solihin, Mahmud Iwan, Abd Manan, Teh Sabariah, Beddu, Salmia, Ahmad, Amiruddin, Wan Rasdi, Nadiah

    Published 2021
    “…To solve the redundancy resolution, meta-heuristic optimizations, namely Genetic Algorithm (GA) and Whale Optimization Algorithm (WOA), are applied to search optimal trajectories inside local orientation angle boundaries. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Optimization of multi-holes drilling path using particle swarm optimization by Najwa Wahida, Zainal Abidin, M. F. F., Ab Rashid, N. M. Zuki, N. M.

    Published 2018
    “…PSO is also compared with another algorithm like Whale Optimization Algorithm, Ant Lion Optimizer, Dragonfly Algorithm, Grasshopper Optimization Algorithm, Moth-flame Optimization and Sine Cosine Algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  6. 6
  7. 7

    The Hybrid of WOABAT-IFDO Optimization Algorithm and Its Application in Crowd Evacuation Simulation by Hamizan, Sharbini, Roselina, Sallehuddin, Habibollah, Haron

    Published 2023
    “…This paper proposes a new hybrid of nature inspired optimization algorithm (IFDO-WOABAT) based on the latest optimization algorithm namely Improved Fitness Dependent Optimization (IFDO) with Whale-Bat Optimization algorithm (WOABAT). …”
    Get full text
    Get full text
    Get full text
    Proceeding
  8. 8

    Hybrid Optimization with Enhanced QoS-based Path Selection in VANETs by F. Al-dolaimy, F. Al-dolaimy, Rabei Raad Ali, Rabei Raad Ali, Noor Nabeel, Noor Nabeel

    Published 2023
    “…This hybrid optimization combines the Improved ant colony optimization (ACO) and Effective Whale Optimization Algorithm (EWOA). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning. by Rajendran, Piraviendran, Othman, Muhaini

    Published 2024
    “…Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks by Sanni, Mistura Laide, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina, Anwar, Farhat, Ahmed, Gharib Subhi Mahmoud

    Published 2015
    “…Thus this paper proposes a Differential Evolution based optimized mobile multicast routing algorithm for the shared tree architecture. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…Algorithms for mutual exclusion in DS are categorized into two main classes including token-based and permission-based algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20