Search Results - (( parameter optimization path algorithm ) OR ( data detection packet algorithm ))*

Refine Results
  1. 1

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff by Sariff, Nohaidda

    Published 2011
    “…The objective is to verify and compare the effectiveness of both algorithms in finding the optimal robot path in different types of global map environments. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Anomaly behavior detection using flexible packet filtering and support vector machine algorithms by Abdul Wahid, Mohammed N.

    Published 2016
    “…The main method is related to processing and filtering data packets using different types of packet filtering on network system and, more specifically, capturing and filtering data packets transmitted on high speed communications links for errors and attackers’ detection and signal integrity analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments by Khaksar, Weria

    Published 2013
    “…Afterward, a genetic algorithm-based optimization framework was designed to improve the interpretability and accuracy of the proposed fuzzy-tabu controller by optimizing the parameters of the FLC and also some of the planner’s parameters in order to improve the quality of the generated paths and runtimes of the planner and also to decrease the variation of the results in different runs of the planner. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Modelling of multi-robot system for search and rescue by Poy, Yi Ler

    Published 2023
    “…This report focusses on developing a novel multi-robot path planning algorithm based on the Modified Particles Swarm Optimization (MPSO) algorithm for dynamic environments. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    The Implementation of Genetic Algorithm in Path Optimization by Jumali, Suriana

    Published 2005
    “…Therefore, the implementation ofGA in path optimization can be ascertained offering a compelling result.…”
    Get full text
    Get full text
    Final Year Project
  8. 8

    The optimization of stepping stone detection: packet capturing steps by Omar, Mohd. Nizam, Maarof, Mond. Aizaini, Zainal, Anazida

    Published 2006
    “…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Evaluation of robot path planning algorithms in global static environments: genetic algorithm vs ant colony optimization algorithm / Nohaidda Sariff and Norlida Buniyamin by Sariff, Nohaidda, Buniyamin, Norlida

    Published 2010
    “…This paper presents the application of Genetic Algorithm and Ant Colony Optimization (ACO) Algorithm for robot path planning (RPP) in global static environment. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis
  11. 11

    The optimization of stepping stone detection : packet capturing steps by Omar, Mohd. Nizam, Maarof, Mohd. Aizaini, Zainal, Anazida

    Published 2006
    “…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    The optimization of stepping stone detection: Packet capturing steps by Omar, Mohd Nizam, Maarof, Mohd Aizaini, Zainal, Anazida

    Published 2006
    “…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism.The aim of the research is to improve the packet capturing step in stepping stone algorithm, thus, improve the response from overall detection and response system.The proposed method is to use small size of user buffer and kernel buffer.Experiments were conducted with two types of packet stream; i) 10 kbps and ii) 10 000 kbps data generated by Tfgen (packet generator) tools and nine combinations of different buffer sizes for each network packet stream were tested.Results from the experiment were analyzed. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets by Alaidaros, Hashem Mohammed

    Published 2017
    “…In addition, it is also aimed to improve the resource consumption of the packet-based detection approach. CHID applied attribute wrapper features evaluation algorithms that marked malicious flows for further analysis by the packet-based detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    The effect of GA parameters on the performance of GA-based QoS routing algorithm by Yussof S., See O.H.

    Published 2023
    “…Genetic algorithm (GA) is a powerful search and optimization algorithm inspired by the theory of genetics and natural selection. …”
    Conference paper
  15. 15

    Minimization of tool path length of drilling process using particle swarm optimization (PSO) by Abdullah, Haslina, Zaman, Nizam Nurehsan, Talib, Norfazillah, Lee, Woon Kiow, Saleh, Aslinda, Zakaria, Mohamad Shukri

    Published 2020
    “…For this study, the main purpose is to apply the Particle Swarm Optimization (PSO) algorithm for use in searching for the optimal tool routing path for in simulation of drilling process…”
    Get full text
    Get full text
    Book Section
  16. 16

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…This study aims to improve the detection of an anomalous behaviour by identifying the outlier data points in the packets more precisely, maximizes the detection of packets with similar behaviours more accurately while reducing the detection time. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Adaptive route optimization for mobile robot navigation using evolutionary algorithm by Kit Guan Lim, Guan Lim, Yoong Hean Lee, Hean Lee, Min Keng Tan, Keng Tan, Hou, Pin Yoong, Tienlei, Wang, Tze, Kenneth Kin Teo

    Published 2021
    “…For example, Ant Colony Optimization (ACO) is an optimization algorithm based on swarm intelligence which is widely used to solve path planning problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  19. 19
  20. 20