Search Results - (( control optimization method algorithm ) OR ( attack detection path algorithm ))
Search alternatives:
- control optimization »
- method algorithm »
- detection path »
- path algorithm »
-
1
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
2
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
Get full text
Get full text
Get full text
Thesis -
3
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
4
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…The attack graph depicts the many paths an attacker may attempt to get around a security policy by leveraging interdependencies between disclosed vulnerabilities. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…Intention-driven model, a sampling traceback technique, provides information about the attack flow and able to reconstruct the attack path to the source of attack by the aid of Intrusion Detection system (IDS). …”
Get full text
Get full text
Thesis -
6
-
7
-
8
-
9
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
10
Imposed weighting factor optimization method for torque ripple reduction of IM fed by indirect matrix converter with predictive control algorithm
Published 2015“…This paper proposes a weighting factor optimization method in predictive control algorithm for torque ripple reduction in an induction motor fed by an indirect matrix converter (IMC). …”
Get full text
Get full text
Get full text
Article -
11
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
Get full text
Get full text
Thesis -
12
Harmony search-based robust optimal controller with prior defined structure
Published 2013“…In this approach, a combination of interacting two levels HS optimization algorithm is presented. In the first level, a new method for analytical formulation of integral square error cost function based on controller variables is elaborated for performance evaluation purposes by the proposed optimization algorithm. …”
Get full text
Get full text
Thesis -
13
Optimized PID controller of DC-DC buck converter based on archimedes optimization algorithm
Published 2023“…This study concludes that the AOA optimization algorithm surpasses other methods in tuning the PID controller for closed-loop DC-DC buck converters.…”
Get full text
Get full text
Get full text
Article -
14
BBO algorithm-based tuning of PID controller for speed control of synchronous machine
Published 2023Article -
15
Optimization and control of hydro generation scheduling using hybrid firefly algorithm and particle swarm optimization techniques
Published 2018“…To deal with these problems, this thesis introduces three approved intelligent controllers for hydropower generation. Firstly, a hybrid algorithm namely firefly particle swarm optimization (FPSO) and series division method (SDM) based on the practical swarm optimization and the firefly algorithm is proposed. …”
Get full text
Get full text
Thesis -
16
Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement
Published 2011“…This thesis present a genetic algorithm based method for placement of FACTS devices for voltage profile improvement. …”
Get full text
Get full text
Thesis -
17
Position tracking of DC motor with PID controller utilizing particle swarm optimization algorithm with lévy flight and doppler effect
Published 2025“…Traditional optimization algorithms like particle swarm optimization, whale optimization algorithm, grey wolf optimizer, and moth flame optimization often face challenges in balancing exploration and exploitation, leading to suboptimal performance. …”
Get full text
Get full text
Get full text
Article -
18
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…—Whale Optimization Algorithm (WOA) and Grey Wolf Optimizer (GWO) are well-perform metaheuristic algorithms used by various researchers in solving feature selection problems. …”
Get full text
Get full text
Article -
19
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…Whale Optimization Algorithm (WOA) and Grey Wolf Optimizer (GWO) are well-perform metaheuristic algorithms used by various researchers in solving feature selection problems. …”
Get full text
Get full text
Article -
20
Fuzzy based BSA optimization for maximum power point tracking controller performance evaluation
Published 2023“…Computer circuits; Controllers; Conversion efficiency; Fuzzy logic; Learning algorithms; Power control; Solar energy; Solar power generation; Vehicle performance; Algorithms optimizations; Backtracking search algorithms; Controller performance; Fuzzy logic control; Fuzzy logic controllers; Maximum Power Point Tracking; Optimization method; Performances evaluation; Power; Tracking controller; Maximum power point trackers…”
Conference Paper
