Search Results - (( swarm optimization mead algorithm ) OR ( based instruction security algorithm ))
Search alternatives:
- instruction security »
- optimization mead »
- mead algorithm »
-
1
A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network
Published 2024“…Results: Simulation results perfectly showed that the suggested localization algorithm based on NMM can carry out a better performance than that of other localization algorithms utilizing other op- timization approaches, including a particle swarm optimization, ant colony (ACO) and bat algorithm (BA). …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Single and Multiple variables control using Tree Physiology Optimization
Published 2017“…In the proposed method, each shoot from each branch search for possible solution in parallel and the fitness is evaluated based on all best values found by branch search. The proposed algorithm is also compared with deterministic gradient-free algorithm: Nelder-Mead simplex (NMS) and another metaheuristic algorithm: Particle Swarm Optimization (PSO). …”
Get full text
Get full text
Article -
3
Optimized PID controller of DC-DC buck converter based on archimedes optimization algorithm
Published 2023“…The proposed PID controller, optimized using AOA, is contrasted with PID controllers tuned via alternative algorithms including the hybrid Nelder-Mead method (AEONM), artificial ecosystem-based optimization (AEO), differential evolution (DE), and particle swarm optimizer (PSO). …”
Get full text
Get full text
Get full text
Article -
4
RISC-V instruction set extension on blockchain application
Published 2024“…This project is an instruction set extension project based on RISC-V architecture for academic purpose. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
Get full text
Get full text
Get full text
Thesis -
6
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
7
Development of IoT-based automated dynamic emergency response system against fire incidents in academic building
Published 2023“…Overall, the proposed system aims to improve the safety and security through real-time monitoring and response capabilities. …”
Get full text
Get full text
Get full text
Get full text
Article
