Search Results - (( host destination ((a algorithm) OR (_ algorithm)) ) OR ( spider optimization based algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Social spider optimisation algorithm for dimension reduction of electroencephalogram signals in human emotion recognition by Al-Qammaz, Abdullah Yousef, Ahmad, Farzana Kabir, Yusof, Yuhanis

    Published 2018
    “…Due to some limitations of current heuristics and evolutionary algorithms, this paper proposed a new swarm based algorithm for feature selection method called Social Spider Optimization (SSO-FS). …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…Then the algorithm was tested with attack on one host and a sub net of six hosts with attack rates of25%, 50% and 75% for the first case and 50%, 75% attack rate for the subnet case. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6

    A hybrid algorithm for improving the quality of service in MANET by Hassan, Mustafa Hamid, Mostafa, Salama A., Budiyono, Avon, Mustapha, Aida, Gunasekaran, Saraswathy Shamini

    Published 2018
    “…This paper proposes a different hybrid algorithm that combines Cellular Automata (CA) with the African Buffalo Optimization (ABO), CAABO, to improve the QoS of MANETs. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    A hybrid algorithm for improving the quality of service in MANET by Hassan M.H., Mostafa S.A., Budiyono A., Mustapha A., Gunasekaran S.S.

    Published 2023
    “…This paper proposes a different hybrid algorithm that combines Cellular Automata (CA) with the African Buffalo Optimization (ABO), CAABO, to improve the QoS of MANETs. …”
    Article
  9. 9

    Route planner mobile web application for UiTM Malaysia / Suzana Ahmad ... [et al.] by Ahmad, Suzana, Mat Diah, Norizan, Mohamad Kamal, Nor Ashikin, Mohd Jailani, Siti Zalekha

    Published 2009
    “…The user can select any listed location as a starting point and any listed location as a destination. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems by Uwadiegwu, Inyama Victor

    Published 2019
    “…The scheme will be useful in a various scenario of IoT environment where data is sent from unattended nodes to the destination known as a sink or receiver.…”
    Get full text
    Get full text
    Thesis
  11. 11

    The development of parameter estimation method for Chinese hamster ovary model using black widow optimization algorithm by Nurul Aimi Munirah, ., Muhammad Akmal, Remli, Noorlin, Mohd Ali, Hui, Wen Nies, Mohd Saberi, Mohamad, Khairul Nizar Syazwan, Wan Salihin Wong

    Published 2020
    “…The proposed algorithm has been compared with the other three famous algorithms, which are Particle Swarm Optimization (PSO), Differential Evolutionary (DE), and Bees Optimization Algorithm (BOA). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…Moreover, three proposed approaches for gateway discovery are implemented; propose a forwarding algorithm, and route determination algorithm for default route and host route in MANET are investigated.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…Existing on-demand routing protocols perform route discovery process by flooding the network with a query message (RREQs) requesting a route to the destination. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A deep learning approach: The impact of sentiment analysis of Bangladeshi workers over the world by Tomal, Md Raihanul Islam, Kader, Tanveer, Kohbalan, Moorthy, Mazlina, Abdul Majid

    Published 2025
    “…TF-IDF vectorization was used for feature extraction, followed by basic machine learning algorithms such as Decision Tree, Support Vector Machine, and Naive Bayes. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    ScannerVision: Scanner-based image acquisition of medically important arthropods for the development of computer vision and deep learning models by Ong, Song Quan, Nathan Pinoy, Lim, Min Hui, Kim Bjerge, Francisco Javier Peris-Felipo, Rob Lind, Jordan P. Cuff, Samantha M. Cook, Toke Thomas Høye

    Published 2025
    “…In this paper, we present a high-throughput scanner-based method for capturing images of arthropods that can be used to generate large datasets suitable for training machine learning algorithms for identification. …”
    Get full text
    Get full text
    Get full text
    Article