Search Results - (( use prevention mechanism algorithm ) OR ( based optimization method algorithm ))*

Refine Results
  1. 1

    Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks by Ghathwan, Khalil Ibrahim

    Published 2016
    “…The mechanism is developed to find the shortest secure path and to reduce overhead using the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A Novel Model on Curve Fitting and Particle Swarm Optimization for Vertical Handover in Heterogeneous Wireless Networks by Goudarzi, S., Hassan, W.H., Anisi, M.H., Soleymani, S.A., Shabanzadeh, P.

    Published 2015
    “…Simulation results indicate that using CF-PSO algorithm can decrease the number of unnecessary handovers and prevent the “Ping-Pong” effect. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Nature-Inspired Drone Swarming for Wildfires Suppression Considering Distributed Fire Spots and Energy Consumption by Alsammak I.L.H., Mahmoud M.A., Gunasekaran S.S., Ahmed A.N., Alkilabi M.

    Published 2024
    “…Our quantitative tests show that the improved model has the best coverage (95.3%, 84.3% and 65.8%, respectively) compared to two other methods Levy Flight (LF) algorithm and Particle Swarm Optimization (PSO), which use the same initial parameter values. …”
    Article
  5. 5

    Vehicle pick-up and drop-off schedule optimization in a university setting by Teo, Chun Kit

    Published 2024
    “…A simulated annealing-based multi-directional iterative local search algorithm is employed for solution optimization. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…In order to train Ridgelet probabilistic neural network, a modified differential evolution algorithm with new mutation phase, crossover process, and selection mechanism is introduced. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Modelling of assembly line balancing with energy consumption by Ariff Nijay, Ramli, Mohd Fadzil Faisae, Ab Rashid

    Published 2023
    “…Based on the finding, we could achieve the same results on the computational method along with the manual hand calculation for the evaluated total energy and objective functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Pid-aco vibration controller with magnetorheological damper for wind turbine tower / Mahmudur Rahman by Mahmudur , Rahman

    Published 2019
    “…Next, PID control parameters are optimized with ACO method based on the vibration displacement as objective function to achieve the optimal damping force which is used to encounter vibrations under different excitation frequencies and loading conditions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…Therefore, the SMA method is redesigned for optimal location and sizing based on the total active power loss of the systems. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Opposition-based Whale Optimization Algorithm by Alamri, Hammoudeh S., Alsariera, Yazan A., Kamal Z., Zamli

    Published 2018
    “…The OWOA use the Opposition-based method to enhance Whale Optimization Algorithm (WOA) performance. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
    Get full text
    Get full text
    Article
  17. 17

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…GA is a widely used optimization algorithm based on the concept of survival of the fittest. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory by Muna, Elsadig, Azween, Abdullah

    Published 2010
    “…This autonomous system improves the performance of the current Intrusion Prevention System (IPS) and carries on system continuity by using the Self–Healing (SH) mechanism.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz by Abdul Aziz, Nurizzati

    Published 2016
    “…Therefore, optimization methods are often used in the sizing algorithms for such systems. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Firefly algorithm for optimal sizing of stand-alone photovoltaic system / Nur Izzati Abdul Aziz by Abdul Aziz, Nur Izzati

    Published 2016
    “…Therefore, optimization methods are often used in the sizing algorithms for such systems. …”
    Get full text
    Get full text
    Thesis