Search Results - probable evaluation ((((sensor algorithm) OR (bees algorithm))) OR (path algorithm))
Search alternatives:
- probable evaluation »
- sensor algorithm »
- bees algorithm »
- path algorithm »
-
1
-
2
Probabilistic evaluation of wind power generation
Published 2023“…Monte Carlo simulation enables the realization of artificial futures by generating a huge number of sample paths of outcomes to perform this analysis. The paper presents an algorithm developed for a random wind speed generator governed by the probability density function of Weibull distribution and evaluates the WTG's output by using the power curve of wind turbines. …”
Conference paper -
3
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…The main motivation for this research is to introduce and evaluate an advance new customized GA. Comparison results of different combinatorial operators, and tests with different probability factors are shown. …”
Get full text
Get full text
Thesis -
4
An efficient backoff algorithm for IEEE 802.15.4 wireless sensor networks
Published 2014Get full text
Get full text
Article -
5
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
Published 2013“…EBA-15.4MAC is based on two new important techniques; firstly, it updates he contention window size based on the probability of collision parameter. In other words, when the number of nodes increases in the network, the probability of collision will increase as well, so we include the probability of collision as a parameter to adapt the CW size. …”
Get full text
Get full text
Thesis -
6
WSN based intruder detection system based on Territorial Predator Scent Marking Algorithm (TPSMA) sensor node placement scheme
Published 2023Conference Paper -
7
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
8
STITCH-256: A dedicated cryptographic hash function
Published 2023“…Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. …”
Article -
9
Enhanced ABD-LSSVM for energy fuel price prediction
Published 2013“…This paper presents an enhanced Artificial Bee Colony (eABC)based on Lévy Probability Distribution (LPD) and conventional mutation. …”
Get full text
Get full text
Get full text
Article -
10
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…In the benchmarking of the SKF and ssSKF algorithms’ performance in solving the 14-hole PCB drill path optimization case study with recent implementations, on average, both algorithms show the ability to converge to the optimal solution at a smaller number of function evaluations compared to the Gravitational Search Algorithm (GSA), Cuckoo Search (CS), and Intelligent Water Drop (IWD), although fall-short to the Taguchi- Genetic Algorithm optimization algorithm.…”
Get full text
Get full text
Thesis -
11
Design of A unmanned aerial vehicles assisted search and rescue collaboration architecture for emergency communication systems / Abdu Ahmed Saif Ahmed
Published 2022“…The multi-UAV and SAR collaboration have been evaluated based on average capacity, energy efficiency, line-of-sight probability, path loss, throughput performance, coverage probability analysis and outage probability performance. …”
Get full text
Get full text
Get full text
Thesis -
12
A review on path collisions and resources usage in hybrid optical network on chip (HONoC)
Published 2015“…The purpose of this paper is to evaluate main problems in HONoC. From the evaluation, three main problems has been identified which are path collisions, low resource usage and high power consumption in HONoC.…”
Get full text
Get full text
Conference or Workshop Item -
13
Enhanced ABC-LSSVM For Energy Fuel Price Prediction
Published 2014“…This paper presents an enhanced Artifi cial Bee Colony (eABC) based on Lévy Probability Distribution (LPD) and conventional mutation. …”
Get full text
Get full text
Get full text
Article -
14
Hybrid metaheuristic method for clustering in wireless sensor networks / Bryan Raj Peter Jabaraj
Published 2023“…As such, this thesis proposes a hybrid metaheuristic method that consists of Sperm Swarm Optimization (SSO) algorithm and Genetic Algorithm (GA), which is termed HSSOGA. …”
Get full text
Get full text
Get full text
Thesis -
15
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2006“…The main motivation for this study is to introduce and evaluate an advance new customized GA. Comparison results of different combinatorial operators and tests with different probability factors are shown. …”
Get full text
Get full text
Get full text
Article -
16
A review on path collisions and resources usage in hybrid optical Network on Chip (HONoC)
Published 2023Conference Paper -
17
Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks
Published 1999“…The merge event bias as one of the essential problems associated with PERT is discussed, along with models and approaches developed by other researchers, namely, Probabilistic Network Evaluation Technique (PNET algorithm), Modified PNET, Back-Forward Uncertainly Estimation procedure (BFUE) and concept based on the robust reliability idea. …”
Get full text
Get full text
Thesis -
18
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2023“…The main motivation for this study is to introduce and evaluate an advance new customized GA. Comparison results of different combinatorial operators and tests with different probability factors are shown. …”
Article -
19
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2023“…The main motivation for this study is to introduce and evaluate an advance new customized GA. Comparison results of different combinatorial operators and tests with different probability factors are shown. …”
Article -
20
