Search Results - (( initial solution drops algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Vehicle pick-up and drop-off schedule optimization in a university setting by Teo, Chun Kit

    Published 2024
    “…A simulated annealing-based multi-directional iterative local search algorithm is employed for solution optimization. The initial solution is generated by distributing requests across vehicles, and local searches are performed through request swapping and movement. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…However, the HKA algorithm has its own flaws. Although it was introduced as a population-based stochastic optimization algorithm, HKA is not exactly a population-based algorithm because it initializes and updates only a single solution. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…The first algorithm, named as Framework Initialization algorithm, is developed to initialize the framework and discovering the subsystems configured in order to derive the interoperation tasks. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks by Han, Fengrong

    Published 2022
    “…The dynamic communication range is introduced to refine hop between anchor nodes, and new parameters are recommended to optimize network protocol to balance energy cost in the initial step. Besides, the weighted coefficient and centroid algorithm is employed to reduce cumulative error by hop count and cut down computational complexity. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis