Search Results - (( evolution optimization perception algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- optimization perception »
- evolution optimization »
- perception algorithm »
- application matching »
- java application »
-
1
-
2
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…The Genetic Algorithm is an area in the field of Artificial Intelligence that is founded on the principles of biological evolution. …”
Get full text
Get full text
Thesis -
3
Evolution, design, and future trajectories on bipedal wheel-legged robot: A comprehensive review
Published 2023“…Identifying gaps in current research, the review suggests future directions for investigation in the fields of robotics and control engineering, addressing the evolution and terrain adaptability of bipedal wheel-legged robots, control, stability, and locomotion, as well as integrated sensory and perception systems, microcontrollers, cutting-edge technology, and future design and control directions.…”
Get full text
Get full text
Get full text
Article -
4
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
5
-
6
-
7
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
8
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
-
10
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
