Search Results - (( swarm optimization mead algorithm ) OR ( based instruction security algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network by Gumaida, Bassam, Abubakar, Adamu

    Published 2024
    “…Results: Simulation results perfectly showed that the suggested localization algorithm based on NMM can carry out a better performance than that of other localization algorithms utilizing other op- timization approaches, including a particle swarm optimization, ant colony (ACO) and bat algorithm (BA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Single and Multiple variables control using Tree Physiology Optimization by Halim, A.H., Ismail, I.

    Published 2017
    “…In the proposed method, each shoot from each branch search for possible solution in parallel and the fitness is evaluated based on all best values found by branch search. The proposed algorithm is also compared with deterministic gradient-free algorithm: Nelder-Mead simplex (NMS) and another metaheuristic algorithm: Particle Swarm Optimization (PSO). …”
    Get full text
    Get full text
    Article
  3. 3

    Optimized PID controller of DC-DC buck converter based on archimedes optimization algorithm by Ling, Kuok Fong, Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad

    Published 2023
    “…The proposed PID controller, optimized using AOA, is contrasted with PID controllers tuned via alternative algorithms including the hybrid Nelder-Mead method (AEONM), artificial ecosystem-based optimization (AEO), differential evolution (DE), and particle swarm optimizer (PSO). …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…This project is an instruction set extension project based on RISC-V architecture for academic purpose. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7