Search Results - (( evolution optimization bees algorithm ) OR ( attack detection method algorithm ))

Refine Results
  1. 1

    Coil Optimization using Metaheuristic Techniques for Wireless Charging of Electric Vehicles - A Comparative Analysis. by Imtiaz T., Elsanabary A., Mekhilef S., Mubin M.B., Soon T.K., Aziz N.F.A.

    Published 2024
    “…Differential Evolution (DE), Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) optimization algorithms are used to obtain the lengths of all the turns of the transmitter coil. …”
    Conference Paper
  2. 2

    Application of swarm intelligence optimization on bio-process problems / Mohamad Zihin Mohd Zain by Mohamad Zihin , Mohd Zain

    Published 2018
    “…An improved version of Differential Evolution (DE) namely Backtracking Search Algorithm (BSA) is applied to several fed batch fermentation problems and its performance is compared with recent emerging metaheuristics such as Artificial Algae Algorithm (AAA), Artificial Bee Colony (ABC), Covariance Matrix Adaptation Evolution Strategy (CMAES) and DE. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Broadening selection competitive constraint handling algorithm for faster convergence by Shaikh, T.A., Hussain, S.S., Tanweer, M.R., Hashmani, M.A.

    Published 2020
    “…In this study, the BSCCH algorithm has been coupled with Differential Evolution algorithm as a proof of concept because it is found to be an efficient algorithm in the literature for constrained optimization problems. …”
    Get full text
    Get full text
    Article
  4. 4

    Comparative analysis of spiral dynamic algorithm and artificial bee colony optimization for position control of flexible link manipulators by Nor Maniha, Abdul Ghani, Nizaruddin, M. Nasir, Azrul Azim, Abdullah Hashim

    Published 2024
    “…This study aims to evaluate the effectiveness of two optimization algorithms, artificial bee colony (ABC) and spiral dynamic algorithm (SDA), in controlling the position of a flexible-link manipulator. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An application of grey wolf optimizer for commodity price forecasting by Mustaffa, Zuriani, Sulaiman, Mohd Herwan, Yusof, Yuhanis

    Published 2015
    “…Over the recent decades, there are many nature inspired optimization algorithms have been introduced.In this study, a newly algorithm namely Grey Wolf Optimizer (GWO) is employed for gasoline price forecasting.The performance of GWO is compared against the results produced by Artificial Bee Colony (ABC) algorithm and Differential Evolution (DE) algorithm. …”
    Get full text
    Get full text
    Article
  6. 6

    An Application of Grey Wolf Optimizer for Commodity Price Forecasting by Zuriani, Mustaffa, M. H., Sulaiman, Yuhani, Yusof

    Published 2015
    “…The performance of GWO is compared against the results produced by Artificial Bee Colony (ABC) algorithm and Differential Evolution (DE) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Optimization of fed-batch fermentation processes using the Backtracking Search Algorithm by Mohd Zain, Mohamad Zihin, Kanesan, Jeevan, Kendall, Graham, Chuah, Joon Huang

    Published 2018
    “…However, the complexity of these processes requires an expert system that involves swarm intelligence-based metaheuristics such as Artificial Algae Algorithm (AAA), Artificial Bee Colony (ABC), Covariance Matrix Adaptation Evolution Strategy (CMAES) and Differential Evolution (DE) for simulation and optimization of the feeding trajectories. …”
    Get full text
    Get full text
    Article
  11. 11

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Comparative Study of Economic Dispatch by Using Various Optimization Techniques by Hong, Mee Song, M. H., Sulaiman, Mohd Rusllim, Mohamed, Wong, Lo Ing

    Published 2014
    “…The optimization techniques used in this paper to do the comparison are Quadratic Programming (QP), Artificial Bee Colony (ABC), Particle Swarm Optimization (PSO), Simulated Annealing (SA), Differential Evolution (DE) and Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique by Al Ogaili, Riyadh Rahef Nuiaa

    Published 2023
    “…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
    Get full text
    Get full text
    Thesis
  17. 17

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…While the effectiveness of some machine learning algorithms in detecting certain types of network intrusion has been ascertained, the situation remains that no single method currently exists that can achieve consistent results when employed for the detection of multiple attack types. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Tole, Sutikno, Shahreen, Kasim, Rohayanti, Hassan, Zalmiyah, Zakaria, Mohd Saberi, Mohamad

    Published 2021
    “…The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. …”
    Get full text
    Get full text
    Article
  20. 20