Search Results - adaptive change differentiation ((selection algorithm) OR (encryption algorithm))

Search alternatives:

  • Showing 1 - 6 results of 6
Refine Results
  1. 1
  2. 2

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Furthermore, it enables non-dominated evaluation of solutions based on four objectives using crowding distance for selection. The proposed algorithm with its variable length solution encoding enables moving the cloudlets among pre-defined locations, adding or removing them in order to increase the quality of service according to the change in the user density caused by user mobility. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Multi agent quality of service routing based on scheme ant colony optimization algorithm by Baygi, Maassoumeh Javadi

    Published 2014
    “…The proposed scheme has been simulated by OMNET++ and compared with standard AntNet and two well-known standard QoS routings; Widest Shortest Path (WSP) algorithm and Shortest Widest Path (SWP) algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…The IEM algorithm uses the attraction-repulsion mechanism to change the positions of solutions towards the optimality. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of novel distance relay scheme to prevent false tripping during power swing by Mohamad, Nor Zulaily

    Published 2017
    “…The proposed adaptive algorithm has been developed by employing the combination of both detection schemes, as well as based on an adaptive setting of Under Impedance Fault Detector (UIFD) tripping characteristics to dynamically adjust its tripping region during power swing and stop the adjustment if a fault occurs during power swing. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 3, we propose a new online system to detect malicious spam emails and to adapt to the changes of malicious URLs in the body of spam emails by updating the system daily. …”
    Get full text
    Get full text
    Thesis