Search Results - (( variable classification matching algorithm ) OR ( evolution optimization protocol algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Differential evolution optimization for constrained routing in Wireless Mesh Networks by Sanni, Mistura Laide, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina, Ahmed, Gharib Subhi Mahmoud, Anwar, Farhat, Zakaria, Omar

    Published 2014
    “…However, this problem is NP-complete, hence, this paper proposes fast convergent Differential Evolution metaheuristic algorithm with bandwidth and delay constraints for minimum routing cost. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…The challenging issue of routing protocols is to reduce the communication overhead for data transmission by determining an optimal path. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…The results showed that the QEEA algorithm outperformed the other algorithms as it could achieve up to 18% of maximum throughput, 27% reduction in ECR, and 36% improvement in EE in terms of radius ranging from 200 m to 1000 m. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A comparative study for parameter selection in online auctions by Gan, Kim Soon

    Published 2009
    “…Hence, this work attempts to improve an existing bidding strategy by taking into accounts the evolution of various model of generic algorithm in optimizing the parameter of the bidding strategies. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A hybrid serendipity social recommender model / Ahmad Subhi Zolkafly and Rahayu Ahmad by Zolkafly, Ahmad Subhi, Ahmad, Rahayu

    Published 2020
    “…This algorithm aims to define the higher matching suggested attributes and used for processing massive data. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Predicting Cheaters in PlayerUnknown’s Battlegrounds (PUBG) using Random Forest Algorithm by Nurin Alya, Haris

    Published 2023
    “…Patterns and relationships between input variables and cheating behaviours are analysed through the application of supervised learning techniques, specifically a classification model. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9

    Risk perception modeling based on physiological and emotional responses / Ding Huizhe by Ding , Huizhe

    Published 2024
    “…To validate the research findings, a second experiment was conducted in a construction scenario, still utilizing two clips with closely matched risk degrees. It was demonstrated that the primary results derived from statistical analysis and machine learning modelling were remarkably consistent, thereby confirming the effectiveness and generalization of the proposed weight adjustment algorithm, particularly in situations with closely matched risk levels. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Development of biosignals-based multimodal biometric system by Osamah Sadeq Alhamdani

    Published 2014
    “…The success of any biometric system is dependent on the pre-processing, features and classification algorithms exploits. There is a need for increase in reliability and security motivated by the fact that there is no unique technology that can be applied for all possible scenarios. …”
    Get full text
    Get full text
    Get full text
    Thesis