Search Results - (( evolution optimization interface algorithm ) OR ( java application force algorithm ))

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  3. 3

    An improved hybrid method combined with a cloud-based supervisory control to facilitate smooth coordination under low-inertia grids by Yiizzan, Suffian, Ahmed Mohamed, Ahmed Haidar, Wan Azlan, Wan Zainal Abidin, Hazrul, Mohamed Basri

    Published 2025
    “…The framework has been validated on interconnected Simulink models running in a real-time cloud platform with data collected from local systems, interfaced in a closed-loop test environment. The proposed algorithm demonstrates outstanding performance in maintaining system stability under various operating conditions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis