Search Results - (( evolution optimization protocol algorithm ) OR ( program implementation re algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Differential evolution optimization for constrained routing in Wireless Mesh Networks by Sanni, Mistura Laide, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina, Ahmed, Gharib Subhi Mahmoud, Anwar, Farhat, Zakaria, Omar

    Published 2014
    “…However, this problem is NP-complete, hence, this paper proposes fast convergent Differential Evolution metaheuristic algorithm with bandwidth and delay constraints for minimum routing cost. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…The challenging issue of routing protocols is to reduce the communication overhead for data transmission by determining an optimal path. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…The results showed that the QEEA algorithm outperformed the other algorithms as it could achieve up to 18% of maximum throughput, 27% reduction in ECR, and 36% improvement in EE in terms of radius ranging from 200 m to 1000 m. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optimization Of Fuzzy Logic Controllers With Genetic Algorithm For Two-Part-Type And Re-Entrant Production Systems by Homayouni, Seyed Mahdi

    Published 2008
    “…The optimized GDF and GSF can be used in real implementations. GDF and GSF controllers are evaluated for two test cases namely “two-part-type production line” and “re-entrant production system”. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A comparative study for parameter selection in online auctions by Gan, Kim Soon

    Published 2009
    “…Hence, this work attempts to improve an existing bidding strategy by taking into accounts the evolution of various model of generic algorithm in optimizing the parameter of the bidding strategies. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir by Sambo, C.H., Hematpour, H., Danaei, S., Herman, M., Ghosh, D.P., Abass, A., Elraies, K.A.

    Published 2016
    “…The second method is automatic optimization using Genetic Algorithm. That depends on the principle of natural selection as proposed by Darwin The genetic program was coupled with the reservoir flow model to re-evaluate the chosen wells at each iteration until obtaining the optimal choice. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network by Noraziah, Adzhar, Shaharuddin, Salleh

    Published 2017
    “…Through simulation program, our proposed algorithm succeeded in performing complete routing up to 81 nodes with 40 nets in 9×9 SD-Torus network size.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…In this paper, a development of low-cost RSA-based Crypto Embedded System targeted for electronic document security is presented. The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Query proof structure caching for incremental evaluation of tabled prolog programs / Taher Muhammad Ali by Taher Muhammad, Ali

    Published 2013
    “…PROLOG is the most well known, widely used programming language for logic programming. PROLOG is a programming language that uses a small set of basic mechanisms to create surprisingly powerful programs. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment by Al-Doski, Jwan M. Mohammed

    Published 2013
    “…In this study, vegetation indices, tasseled cap transformation, hybrid classification as a combination of k-means and support vector machine algorithms,and post-classification comparison were respectively implemented to detect and assess LULC in Halabja. …”
    Get full text
    Get full text
    Thesis
  15. 15