Search Results - (( weight distribution path algorithm ) OR ( parameter destination _ algorithm ))
Search alternatives:
- parameter destination »
- weight distribution »
- distribution path »
- path algorithm »
-
1
Levy slime mould algorithm for solving numerical and engineering optimization problems
Published 2022“…The proposed Levy Slime Mould Algorithm (LSMA) is a novel metaheuristic algorithm that integrates the Levy distribution into a new metaheuristic called Slime Mould Algorithm (SMA) for solving numerical and engineering problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…For wireless sensor network (WSN) integrated dynamic IoT networks, this paper presents a trust-aware secure Ant colony optimization (ACO)-based routing algorithm to provide security while searching for an energy-efficient optimal routing path. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Modelling of multi-robot system for search and rescue
Published 2023“…In this project, this sensor-based algorithm is known as the Obstacle Avoidance Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Artificial Bee Colony for Minimizing the Energy Consumption in Mobile Ad Hoc Network
Published 2019“…The aim of this paper is to find the best possible route from the source to the destination based on a method inspired by the searching behaviour of bee colonies, i.e. artificial bee colony (ABC) algorithm. …”
Get full text
Get full text
Article -
5
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
6
Review of Network on Chip Architectures
Published 2017“…The packet traverses along these nodes to reach the destination using routing algorithm. Conclusion: In this paper, NoC architectures are reviewed using different parameters, detail information is also provided for these parameters. …”
Get full text
Get full text
Article -
7
A Hybrid Metaheuristic Technique Based on Grey Wolf Optimisation, Symbiotic Organism Search, and Ant Colony Optimisation for Solving Multi-Objective Vehicle Routing Problems
Published 2025“…Based on a single-vehicle optimal route, the algorithm provided the shortest distance, 91.74 km. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A genetic approach for gateway placement in wireless mesh networks
Published 2015“…Finally, we evaluated the proposed algorithm using many generated instances using different parameters (population size, tournament size, crossover type, mutation type), the experimental results had shown that the high convergence rate using different parameters. …”
Get full text
Get full text
Get full text
Article -
9
Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff
Published 2011“…The main goal of this research is to compare the performances between Genetic Algorithm (GA) and Ant Colony Optimization (ACO) algorithm. …”
Get full text
Get full text
Thesis -
10
Collision avoidance mechanisms using artificial potential field for UAVs
Published 2025“…The APF algorithm, based on the combination of attractive and repulsive potential functions, is modeled and simulated in MATLAB to guide UAVs toward target destinations while avoiding obstacles. …”
Get full text
Get full text
Get full text
Article -
11
Comparison of DSR, AODV and DSDV routing protocols in mobile ad-hoc networks: A survey
Published 2014“…A mobile ad hoc network (MANET) is a collection of mobile nodes that is connected through a wireless medium forming rapidly changing topologies.Mantes are infrastructure less and can be set up anytime, anywhere.We have conducted survey of protocol properties of various MANET routing algorithms and analyzed them.The routing algorithms considered are classified into three categories proactive (table driven) , reactive (on demand) and Hybrid protocol.The algorithms considered are Dynamic Source Routing (DSR), Ad-hoc On-Demand Distance Vector Routing (AODV) and Destination sequence Vector (DSDV) have been proposed to solve the multi hop routing problem in Ad-hoc networks.The comparison among three routing protocols are based on the various protocol property parameters such as Routing overhead, packet delivery ratio, end-to-end delay, path optimality, and throughput are some metrics commonly used in the comparisons.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Analysis On QOS Parameters To Predict Http Response
Published 2017“…Therefore, the real live world web service label data uses to evaluate the focus parameters using classification machine learning algorithms to process the data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…Multi-Instance Broker Scheduling Algorithm (MiBSA) has been proposed as a new scheduling algorithm to get rid of the drawback from the iHLBA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…Then, timetabling process is performed to identify a set of departure times at both origin and destination based on predefined parameters. The multiobjective set covering model is used by including some real-world restrictions to find number of buses and drivers as it can represent the problem clearly for implementation. …”
Get full text
Get full text
Thesis -
15
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…It is evident from the result that the proposed algorithm able to produced better result.…”
Get full text
Get full text
Thesis -
16
Re-engineering grid-based quorum replication into binary vote assignment on cloud: A scalable approach for strong consistency in cloud databases
Published 2025“…The study establishes BVAC as an advancement in distributed data management and a foundation for future adaptive and multi-cloud replication frameworks.…”
Get full text
Get full text
Get full text
Article -
17
Performance evaluation of manet in presence of black hole nodes
Published 2017“…In this type of attack, the black hole node uses the maximum destination sequence number to lure the sender node, to send packets via the shortest path, so that it will drop or alter the packets intentionally instead of sending them to the destination. …”
Get full text
Get full text
Thesis -
18
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…The scheme will be useful in a various scenario of IoT environment where data is sent from unattended nodes to the destination known as a sink or receiver.…”
Get full text
Get full text
Thesis -
19
Traffic management algorithms for LEO satellite networks
Published 2016“…The performances of the proposed algorithms are then compared with the previously developed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
20
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…However, AODV suffers severely from the black hole attacks where the attacker node advertise itself as having the optimum path leading to the destination node by varying some essential parameters. …”
Get full text
Get full text
Get full text
Thesis
