Search Results - (( initial solution drops algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- initial solution »
- java implication »
- implication tree »
- tree algorithm »
- drops »
-
1
Vehicle pick-up and drop-off schedule optimization in a university setting
Published 2024“…A simulated annealing-based multi-directional iterative local search algorithm is employed for solution optimization. The initial solution is generated by distributing requests across vehicles, and local searches are performed through request swapping and movement. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…However, the HKA algorithm has its own flaws. Although it was introduced as a population-based stochastic optimization algorithm, HKA is not exactly a population-based algorithm because it initializes and updates only a single solution. …”
Get full text
Get full text
Thesis -
3
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…The first algorithm, named as Framework Initialization algorithm, is developed to initialize the framework and discovering the subsystems configured in order to derive the interoperation tasks. …”
Get full text
Get full text
Thesis -
4
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…The dynamic communication range is introduced to refine hop between anchor nodes, and new parameters are recommended to optimize network protocol to balance energy cost in the initial step. Besides, the weighted coefficient and centroid algorithm is employed to reduce cumulative error by hop count and cut down computational complexity. …”
Get full text
Get full text
Thesis -
5
Improving Network Consistency and Data Availability Using Fuzzy C Mean Clustering Algorithm in Wireless Sensor Networks
Published 2024thesis::doctoral thesis -
6
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
Get full text
Get full text
Get full text
Get full text
Thesis
