Search Results - (( model evaluation sensor algorithm ) OR ( using optimization _ algorithm ))

Refine Results
  1. 1

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism by Alomari M.F., Mahmoud M.A., Gharaei N., Rasool S.M., Hasan R.A.

    Published 2025
    “…The core of the algorithm utilizes a Genetic Algorithm (GA) to find the optimal position for the first evaluator by minimizing the total distance between this evaluator and all CCTV nodes, aiming for surveillance efficiency. …”
    Conference paper
  4. 4

    Satellite attitude determination utilizing measurement sensor data and kalman filtering by Samaan, Malak A., Abdelrahman, Mohammad

    Published 2006
    “…Using only star measurements an optimal satellite orientation estimate is found using the method of least squares, and the particular algorithm invoked is referred to ESOQ2 method. …”
    Get full text
    Get full text
    Article
  5. 5

    Using artificial intelligence search in solving the camera placement problem by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P.

    Published 2022
    “…Two case studies are used to evaluate those algorithms, and the camera placement problem is formulated as a coverage maximization problem. …”
    Get full text
    Get full text
    Book
  6. 6

    Accurate range free localization in multi-hop wireless sensor networks by Abdulwahhab, Abdullah Raed

    Published 2019
    “…Simulation and experimental results show a substantial performance gain achieved by our proposed localization algorithm in wireless sensor networks. The performance is evaluated in terms of RMSE in terms of three algorithms WLS, CRLR, and GMSDP based on using the Monte Carlo simulation with account the number of anchors that varying from anchor=4 to anchor =20. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Speed sensorless control of permanent magnet synchronous motor using model reference adaptive system and artificial neural network / Abdul Mu’iz Nazelan by Nazelan, Abdul Mu’iz

    Published 2019
    “…First, the field oriented control (FOC) is modelled and validated using sensor-based method to ensure its ability in controlling the PMSM. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors by Binajjaj, Saeed Ali Saeed

    Published 2010
    “…The imaging algorithm was based on a non-linear optimization technique from which the single-step and iterative inversion schemes were realized. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Transmission path optimization Based on Efficiency Communication System by Jin Fan, Kit, Guan Lim, Sin, Helen Ee Chuo, Min, Keng Tan, Ali Farzamnia, Tze, Kenneth Kin Teo

    Published 2022
    “…Routing is the core of wireless sensor network deployment. This paper points out the research focus of the wireless sensor network transmission path and discusses the optimization problem of the transmission based on grid model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Energy efficiency mechanism using mobile-based fermat's spiral in wireless sensor networks by Mantoro, Teddy, Shaukat Ali, Haroon, Ayu, Media Anugerah, Usino, Wendi

    Published 2011
    “…We evaluated the performance of wireless sensor network using minimum spanning tree algorithm specifically Prim’s Algorithm in order to know the bottleneck effect on wireless sensor network and propose a better solution performance based on Fermat Spiral model. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments by Khaksar, Weria

    Published 2013
    “…Finally, an adaptive neuro-fuzzy inference system (ANFIS) was designed which constructs and optimizes a fuzzy logic controller using a given dataset of input/output variables in order to increase the optimality and stability rates of the proposed path planning algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Activity recognition using optimized reduced kernel extreme learning machine (OPT-RKELM) / Yang Dong Rui by Yang , Dong Rui

    Published 2019
    “…In this study, we have purposed a model named as Optimized Reduced Kernel Extreme Learning Machine (Opt RKELM). …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Coverage and connectivity maximization for wireless sensor networks using improved chaotic grey wolf optimization by Shaikh, Muhammad Suhail, Wang, Chang, Xie, Senlin, Zheng, Gengzhong, Dong, Xiaoqing, Qiu, Shuwei, Mohd Ashraf, Ahmad, Raj, Saurav

    Published 2025
    “…The Grey Wolf Optimizer (GWO) is enhanced using a chaotic map, improving its ability to find the best solutions and achieve faster convergence, resulting in the ICGWO algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Optimizing Visual Sensor Coverage Overlaps for Multiview Surveillance Systems by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P., Saad, N.B., Ibrahim, R.B., Dass, S.C.

    Published 2018
    “…Based on visual sensor parameters information, and the features of the area to be monitored, this paper uses a deterministic modeling approach to model the sensor coverage in a 2-D space. …”
    Get full text
    Get full text
    Article
  15. 15

    Optimizing Visual Sensor Coverage Overlaps for Multiview Surveillance Systems by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P., Saad, N.B., Ibrahim, R.B., Dass, S.C.

    Published 2018
    “…Based on visual sensor parameters information, and the features of the area to be monitored, this paper uses a deterministic modeling approach to model the sensor coverage in a 2-D space. …”
    Get full text
    Get full text
    Article
  16. 16

    Energy band gap modeling of doped bismuth ferrite multifunctional material using gravitational search algorithm optimized support vector regression by Owolabi, Taoreed O., Abd Rahman, Mohd Amiruddin

    Published 2021
    “…The energy band gap of doped bismuth ferrite is modeled in this contribution through the fusion of a support vector regression (SVR) algorithm with a gravitational search algorithm (GSA) using crystal lattice distortion as a predictor. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Non-weighted aggregate evaluation function of multi-objective optimization for knock engine modeling by Witwit, Azher Razzaq Hadi

    Published 2017
    “…The NWAEF model was compared to Random Weights Genetic Algorithm (RWGA) model by using five data sets taken from different internal combustion engines. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network by Ramli, Sofia Najwa

    Published 2016
    “…To enhance the overall performance, this thesis also evaluates the uniqueness and the stability of ECG signal using Independent Component Analysis (ICA) and fast Fourier Transform (FFT) algorithm respectively as the signal is applied as inputs of the proposed ECG-based authentication protocol model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20