Search Results - (( evolution optimization sensor algorithm ) OR ( rate detection method algorithm ))

Refine Results
  1. 1

    Cluster head selection optimization in wireless sensor network via genetic-based evolutionary algorithm by Vincent Chung, Hamzarul Alif Hamzah, Norah Tuah, Kit, Guan Lim, Min, Keng Tan, Kenneth Tze Kin Teo

    Published 2020
    “…Genetic-based evolutionary algorithms such as Genetic Algorithm (GA) and Differential Evolution (DE) have been popularly used to optimize cluster head selection in WSN to improve energy efficiency for the extension of network lifetime. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles by Abdulhasan Al-Jarah, Ali Husam

    Published 2017
    “…In a previous research, a relocating algorithm for mobile sensor network had been introduced and the goal was to save energy and prolong the lifetime of the sensor networks using Particle Swarm Optimization (PSO) where both of sensing radius and travelled distance had been optimized in order to save energy in long-term and shortterm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Design, optimization and fabrication of a climbing six articulated-wheeled robot using artificial evolution and 3D printing by Lim, Shun Hoe, Teo, Jason Tze Wi

    Published 2015
    “…In this research, an artificial evolution approach utilizing Single-Objective Evolutionary Algorithm (SOEA) and Multi-Objective Evolutionary Algorithm (MOEA) respectively are investigated in the automatic design and optimization of the morphology of a Six Articulated-Wheeled Robot (SAWR) with climbing ability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An improved gbln-pso algorithm for indoor localization problem in wireless sensor network by Muhammad Shahkhir, Mozamir

    Published 2022
    “…Then, we compared the result with Particle Swarm Optimization (PSO), Differential Evolution Particle Swarm Optimization (DEPSO), Health Particle Swarm Optimization (HPSO) and Global best Local Neigborhood Particle Swarm Optimization (GbLN-PSO) algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Using the evolutionary mating algorithm for optimizing the user comfort and energy consumption in smart building by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2023
    “…EMA belongs to the evolutionary computation group of nature-inspired metaheuristic algorithms and offers a promising solution. A comparative analysis is conducted with other well-known algorithms such as Particle Swarm Optimization (PSO), Differential Evolution (DE), Ant Colony Optimization (ACO), Biogeography-Based Optimization (BBO), Teaching-Learning Based Optimization (TLBO), and Beluga Whale Optimization (BWO). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Artificial neural controller synthesis for TORCS by Shi, Jun Long

    Published 2015
    “…The results showed: (1) DE hybrid FFNN could generate optimal controllers, (2) the proposed fitness function had successfully generated the required car's racing controllers, (3) the proposed minimization algorithm had been successfully minimize the number of RF sensors used, (4) the PDE algorithm could be implemented to generate optimal solutions for car racing controllers, and (5) the combination of components for average car speed and distance between the car and track axis is very important compared to other components. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…A series of experimental results demonstrate that the proposed method can effectively detect anomalies with low false positive rate, high detection rate and achieve higher detection accuracy.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  13. 13

    On the combination of adaptive neuro-fuzzy inference system and deep residual network for improving detection rates on intrusion detection by Jia, Liu, Yin Chai, Wang, Chee Siong, Teh, Xinjin, Li, Liping, Zhao, Fengrui, Wei

    Published 2022
    “…The experimental results demonstrate that the proposed method is better than that of the original ResNet and other existing methods on various metrics, reaching a 98.88% detection rate and 1.11% false alarm rate on the KDDTrain+ dataset…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Automatic design, optimization and In-Situ Fabrication of Heterogeneous Swarm Robot bodies using 3-D printing and multi-objective evolutionary algorithms by Teo, Jason Tze Wi, Johnny Koh, Chin, Kim On, Chua, Bih Lii, Willey Liew, Noor Ajian Mohd. Lair, Lim, Shun Hoe

    Published 2012
    “…In this research, an artificial evolution approach utilizing Single-Objective Evolutionary Algorithm (SOEA) and Multi-Objective Evolutionary Algorithm (MOEA) respectively are investigated in the automatic design and optimization of the morphology of a Six Articulated-Wheeled Robot (SAWR) with climbing ability. …”
    Get full text
    Get full text
    Research Report
  15. 15

    An Improved Grasshopper Optimization Algorithm Based Echo State Network for Predicting Faults in Airplane Engines by Bala, A., Ismail, I., Ibrahim, R., Sait, S.M., Oliva, D.

    Published 2020
    “…This problem is often formulated as a typical optimization problem. Metaheuristic algorithms are known to be excellent tools for solving optimization problems. …”
    Get full text
    Get full text
    Article
  16. 16

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…An efficient IDS uses computational methods as techniques of machine learning (ML) to enhance the rates of detection to obtain the lowest false positive rate, although such rates tend to be reduced by the big amount of irrelevant features as an optimization issue. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…These algorithms and methods provide fast and high rate of detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Smart agriculture: precision farming through sensor-based crop monitoring and control system by Mohamad Hakhrani, Asyful Azhim, Abdul Hamid, Syamsul Bahrin

    Published 2024
    “…Subsequently, four distinct algorithms are trained with the collected dataset to ascertain the most optimal algorithm for predicting crop growth and harvesting time, resulting in the selection of the Random Forest Regression model, which attains the highest model score of 86%. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Improved Switching-Basedmedian Filter For Impulse Noise Removal by Teoh, Sin Hoong

    Published 2013
    “…Based on the evaluations from root mean square error (RMSE), false positive detection rate, false negative detection rate, mean structure similarity index (MSSIM), processing time, and visual inspection, it is shown that the proposed method is the best method when compared with seven other state-of-the art median filtering methods.…”
    Get full text
    Get full text
    Thesis
  20. 20

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis