Search Results - (( wolf optimisation system algorithm ) OR ( based instruction security algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm by Nik Mohamed Hazli, Nik Muhammad Aiman

    Published 2018
    “…In this research, swarming intelligence is used to solve optimisation problem. Grey Wolf Optimizer and Dragonfly Algorithm were chosen. …”
    Get full text
    Get full text
    Monograph
  2. 2

    INTELLIGENT MODELLING OF GRADIENT FLEXIBLE PLATE STRUCTURE UTILISING HYBRID EVOLUTIONARY ALGORITHM by Muhammad Hasbollah, Hassan

    Published 2023
    “…Thus, a hybrid of grey wolf and particle swarm optimisation (GWO-PSO) were proposed to further improve the system modelling. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    A Hybrid Metaheuristic Technique Based on Grey Wolf Optimisation, Symbiotic Organism Search, and Ant Colony Optimisation for Solving Multi-Objective Vehicle Routing Problems by Ary, Maxsi

    Published 2025
    “…This study developed a hybrid metaheuristic algorithm involving grey wolf optimization, symbiotic organism search, and ant colony optimization (HMGSA) to address the multi-objective VRP. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…This project is an instruction set extension project based on RISC-V architecture for academic purpose. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9