Search Results - (( evolution optimization bees algorithm ) OR ( attack detection method algorithm ))
Search alternatives:
- evolution optimization »
- optimization bees »
- method algorithm »
- bees algorithm »
-
1
Coil Optimization using Metaheuristic Techniques for Wireless Charging of Electric Vehicles - A Comparative Analysis.
Published 2024“…Differential Evolution (DE), Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) optimization algorithms are used to obtain the lengths of all the turns of the transmitter coil. …”
Conference Paper -
2
Application of swarm intelligence optimization on bio-process problems / Mohamad Zihin Mohd Zain
Published 2018“…An improved version of Differential Evolution (DE) namely Backtracking Search Algorithm (BSA) is applied to several fed batch fermentation problems and its performance is compared with recent emerging metaheuristics such as Artificial Algae Algorithm (AAA), Artificial Bee Colony (ABC), Covariance Matrix Adaptation Evolution Strategy (CMAES) and DE. …”
Get full text
Get full text
Thesis -
3
Broadening selection competitive constraint handling algorithm for faster convergence
Published 2020“…In this study, the BSCCH algorithm has been coupled with Differential Evolution algorithm as a proof of concept because it is found to be an efficient algorithm in the literature for constrained optimization problems. …”
Get full text
Get full text
Article -
4
Comparative analysis of spiral dynamic algorithm and artificial bee colony optimization for position control of flexible link manipulators
Published 2024“…This study aims to evaluate the effectiveness of two optimization algorithms, artificial bee colony (ABC) and spiral dynamic algorithm (SDA), in controlling the position of a flexible-link manipulator. …”
Get full text
Get full text
Get full text
Article -
5
An application of grey wolf optimizer for commodity price forecasting
Published 2015“…Over the recent decades, there are many nature inspired optimization algorithms have been introduced.In this study, a newly algorithm namely Grey Wolf Optimizer (GWO) is employed for gasoline price forecasting.The performance of GWO is compared against the results produced by Artificial Bee Colony (ABC) algorithm and Differential Evolution (DE) algorithm. …”
Get full text
Get full text
Article -
6
An Application of Grey Wolf Optimizer for Commodity Price Forecasting
Published 2015“…The performance of GWO is compared against the results produced by Artificial Bee Colony (ABC) algorithm and Differential Evolution (DE) algorithm. …”
Get full text
Get full text
Get full text
Article -
7
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
Get full text
Get full text
Article -
8
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…This means that Multilayer Perceptron algorithm can detect APT attack more accurately. …”
Get full text
Get full text
Get full text
Other -
9
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
10
Optimization of fed-batch fermentation processes using the Backtracking Search Algorithm
Published 2018“…However, the complexity of these processes requires an expert system that involves swarm intelligence-based metaheuristics such as Artificial Algae Algorithm (AAA), Artificial Bee Colony (ABC), Covariance Matrix Adaptation Evolution Strategy (CMAES) and Differential Evolution (DE) for simulation and optimization of the feeding trajectories. …”
Get full text
Get full text
Article -
11
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
12
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
13
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
14
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…This means that Multilayer Perceptron algorithm can detect APT attack more accurately. …”
Get full text
Get full text
Get full text
Other -
15
Comparative Study of Economic Dispatch by Using Various Optimization Techniques
Published 2014“…The optimization techniques used in this paper to do the comparison are Quadratic Programming (QP), Artificial Bee Colony (ABC), Particle Swarm Optimization (PSO), Simulated Annealing (SA), Differential Evolution (DE) and Genetic Algorithm (GA). …”
Get full text
Get full text
Conference or Workshop Item -
16
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
17
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…While the effectiveness of some machine learning algorithms in detecting certain types of network intrusion has been ascertained, the situation remains that no single method currently exists that can achieve consistent results when employed for the detection of multiple attack types. …”
Get full text
Get full text
Thesis -
18
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
19
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Published 2021“…The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. …”
Get full text
Get full text
Article -
20
