Search Results - (( intrusion prevention mechanism algorithm ) OR ( panel optimization modified algorithm ))*
Search alternatives:
- optimization modified »
- intrusion prevention »
- prevention mechanism »
- mechanism algorithm »
- panel optimization »
-
1
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…This autonomous system improves the performance of the current intrusion prevention system and carries on system continuity by using self-healing mechanism.…”
Get full text
Get full text
Thesis -
2
Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
Published 2010“…This autonomous system improves the performance of the current Intrusion Prevention System (IPS) and carries on system continuity by using the Self–Healing (SH) mechanism.…”
Get full text
Get full text
Conference or Workshop Item -
3
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Firstly, we review the state of the art of intelligent intrusion detection and prevention system (IIDPS), and highlight the security requirement of cooperative based-IIDPS. …”
Get full text
Get full text
Thesis -
4
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Therefore, it is of utmost importance to prevent such intrusions. The prevention of such intrusions is entirely dependent on their detection that is a main part of any security tool such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), checkpoints and firewalls. …”
Get full text
Get full text
Thesis -
5
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Therefore, it is of utmost importance to prevent such intrusions. The prevention of such intrusions is entirely dependent on their detection that is a main part of any security tool such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), checkpoints and firewalls. …”
Get full text
Get full text
Thesis -
6
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
Published 2018“…The mechanism’s design is based on the hybrid Antlion Optimization Algorithm (ALO) with Multilayer Perceptron (MLP) to protect against DDoS attacks. …”
Get full text
Get full text
Thesis -
7
An electromagnetism-like mechanism algorithm approach for photovoltaic system optimization
Published 2023“…An Electromagnetism-Like Mechanism Algorithm (EM) has been developed to search for the hourly optimum tilt angles for photovoltaic panels. …”
Article -
8
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Solar Photovoltaic Maximum Power Point Tracking via Predictive Technique
Published 2022“…The potential combination gained from P-V and I-V curves could be referred to develop the optimization system. Hence, from this information, the optimal output voltage, current and power can be delivered from the PV panel. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
-
11
Techno-economic Analysis of a Stand-alone Photovoltaic-Diesel Hybrid System for Rural Applications
Published 2019“…The framework and the generic algorithm of optimizing are modified according to the objectives of this study. …”
Get full text
Get full text
Get full text
Thesis -
12
Dynamic reconfiguration of large-scale PV plant using based on specified switching matrix and genetic algorithm to mitigate partial shading
Published 2023“…In the second stage, Genetic Algorithm (GA) is applied to optimize the output, via rearranging the columns in PV plants to find the optimal solution of reconfiguration. …”
text::Thesis -
13
-
14
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…Moreover, at present, the control plane has no built-in security mechanism that prevents malicious SDN agents from sending authorized but forged flows to corrupt the controller state or bring the entire network down, in the worst case, even if the OpenFlow is Transport Layer Security (TLS) enabled. …”
Get full text
Get full text
Thesis -
15
Development of a systematic method in lean tool selection for automotive industry
Published 2012“…Based on the systematic features of this algorithm, the efficiency and effectiveness of the model in presenting optimizing techniques for lean tool selection with the automotive industry seems reasonable and useful. …”
Get full text
Get full text
Thesis -
16
Mathematical modeling of optical and thermal behaviour of a new cascade nanofluid-based PV/T system / Samir Hassani
Published 2017“…In addition, a modified electrical model was established to predict electrical efficiency of Si and GaAs cells. …”
Get full text
Get full text
Get full text
Thesis
