Search Results - (( using mitigation clustering algorithm ) OR ( using function based algorithm ))

Refine Results
  1. 1

    Hybrid metaheuristic method for clustering in wireless sensor networks / Bryan Raj Peter Jabaraj by Bryan Raj , Peter Jabaraj

    Published 2023
    “…To assist the proposed method, the objective functions used to select optimal CH is refined by adding objectives such as CH’s maximum neighbour node and average isolated node probability. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A Hybrid K-Means Hierarchical Algorithm for Natural Disaster Mitigation Clustering by Prasetyadi, Abdurrakhman, Nugroho, Budi, Tohari, Adrin

    Published 2022
    “…Therefore, the proposed hybrid algorithm can provide relatively homogeneous clustering results in natural disaster mitigation.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours by Kalid Abdlkader Marsal Salih

    Published 2024
    “…Thus, this research proposes enhancement on clustering algorithm to mitigate the impact of correlated node behaviour on network performances. …”
    thesis::doctoral thesis
  6. 6

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    An efficient up-link load reduction model based on clustering in vanets by Abbas Al-Sallami, Ali Hashim

    Published 2019
    “…This study proposed an Efficient Up-link Load Reduction (EULR) model to mitigate the uplink load at BSs. EULR model consisted of three parts: the first part, two novel algorithms Smart CH Election (SCHE) and Hybrid Cluster-Head Election (HCHE) to increase cluster stability and reduce the number of CHs changes in the network by selecting the best vehicle as cluster head (CH) based on two dynamic thresholds. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Data redundancy reduction scheme for data aggregation in wireless sensor network by Adawy, Mohammad Ibrahim

    Published 2020
    “…Therefore, several studies have employed some schemes to reduce data redundancy in the clustered network before data aggregation to mitigate the problems that affects the data aggregation efficiency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An Effective Power Dispatch Strategy for Clustered Micro-grids while Implementing Optimal Energy Management and Power Sharing Control using Power Line Communication by Ahmed Mohamed, Ahmed Haidar, Adila, Fakhar, Muttaqi, Kashem M

    Published 2019
    “…This paper proposes an effective power dispatch strategy for clustered micro-grids. The developed hybrid algorithm implements optimal energy management and power sharing control using binary data. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  10. 10
  11. 11

    Detecting lung cancer region from CT image using meta-heuristic optimized segmentation approach by Shakeel, Pethuraj Mohamed, Mohd Aboobaider, Burhanuddin, Salahuddin, Lizawati

    Published 2022
    “…In this paper, the butterfly optimization algorithm-based K-means clustering (BOAKMC) method is introduced for reducing CT image segmentation uncertainty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The BOGS-BAT algorithm is based on three techniques. The first technique is to move or switch solution from single function to functions that contain more than one objective functions. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation by Ismael, Ahmed Naser

    Published 2016
    “…Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Utilizing the properties of Lucas functions introduced a public key system based on Lucas functions instead of exponentiation, which offer a good alternative to the most publicly used exponential public key system RSA. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Alzaeemi, Shehab Abdulhabib, Tay, Kim Gaik, Huong, Audrey, Sathasivam, Saratha, Majahar Ali, Majid Khan

    Published 2023
    “…Based on the results, the EP algorithm achieved a higher training rate and simple structure compared with the rest of the algorithms. …”
    Get full text
    Get full text
    Get full text
    Article