Search Results - (( java implementation bat algorithm ) OR ( using scheme based algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3
  4. 4

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…This scheme determines an admission criteria based on scheduling service classes. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks by Mubarak, Mohammed Awadh Ahmed Ben

    Published 2013
    “…In the proposed HATSC scheme, the AHP method is uese for criteria weighting, while the TOPSIS method uses for the selection technique based on a multi-criteria decision-making algorithm is proposed. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS by Akbari, M., Reza, A.W., Noordin, K.A., Manesh, M.R., Hindia, M.N.

    Published 2014
    “…In addition, the ICA-based scheme also indicates promising convergence and time running performance as compared to other schemes.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm by Hintaw, Ahmed Jameel

    Published 2023
    “…A secure hybrid scheme introduces a new design architecture of the symmetric AES algorithm to encrypt the MQTT payload called “D-AES”. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Application Of Higher Order Compact Finite Difference Methods To Problems In Fluid Dynamics by Yap, Wen Jiun

    Published 2003
    “…Third, only the numerical algorithm based on Hermitian scheme is used to solve the flow past a backward-facing step. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A reinforcement learning-based energy-efficient spectrum-aware clustering algorithm for cognitive radio wireless sensor network by Mustapha, Ibrahim

    Published 2016
    “…Performance comparisons of the RL based clustering scheme with Groupwise spectrum-aware clustering scheme show that an energy savings of9% and PU detection performance improvement of 11.6% can be achieved. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network by Adnan, Shahid Khan

    Published 2014
    “…The forward and backward secrecy of the proposed scheme has been extensively validated by formal method using rank theorem. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Post quantum signature schemes for the block chain technology by Wu, Zi Feng

    Published 2019
    “…First we study the different properties and uses of signature schemes, and how Elliptic Curve Digital Signature Algorithm is used in the blockchain technology. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks by Hussein, Yassein Soubhi

    Published 2014
    “…The second scheme is cell selection based on multiple criteria decision making (MCDM) approach. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Differential evolution based special protection and control scheme for contingency monitoring of transmission line overloading by Hadi, Mahmood Khalid, Othman, Mohammad Lutfi, Abdul Wahab, Noor Izzri

    Published 2017
    “…In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution (DE) algorithm for optimal generation rescheduling to mitigate line overloads in contingency conditions has been presented. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Active force control with iterative learning control algorithm for a vehicle suspension by Rosmazi, Rosli

    Published 2013
    “…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…Only the authorized receiver can decrypt the ciphertext with the secret key(s) to obtain the plaintext. Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Feedforward neural network for solving particular fractional differential equations by Admon, Mohd Rashid

    Published 2024
    “…This research aims to develop a scheme based on a feedforward neural network (FNN) with a vectorized algorithm (FNNVA) for solving FDEs in the Caputo sense (FDEsC) using selected first-order optimization techniques: simple gradient descent (GD), momentum method (MM), and adaptive moment estimation method (Adam). …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Utility-based non-cooperative power control game in wireless environment / Yousef Ali Mohammed Al-Gumaei by Yousef Ali, Mohammed Al-Gumaei

    Published 2017
    “…Numerical simulations are used to prove the effectiveness of these algorithms compared with other existing power control algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Differential Evolution Based Special Protection and Control Scheme for Contingency Monitoring of Transmission Line Overloading by Othman, Mohammad Lutfi, Hadi, Mahmood Khalid, Abdul Wahab, Noor Izzri

    Published 2017
    “…In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution (DE) algorithm for optimal generation rescheduling to mitigate line overloads in contingency conditions has been presented. …”
    Get full text
    Get full text
    Get full text
    Book Section