Search Results - (( use prevention mechanism algorithm ) OR ( based optimization method algorithm ))*
Search alternatives:
- prevention mechanism »
- mechanism algorithm »
- method algorithm »
- use prevention »
-
1
Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks
Published 2016“…The mechanism is developed to find the shortest secure path and to reduce overhead using the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
A Novel Model on Curve Fitting and Particle Swarm Optimization for Vertical Handover in Heterogeneous Wireless Networks
Published 2015“…Simulation results indicate that using CF-PSO algorithm can decrease the number of unnecessary handovers and prevent the “Ping-Pong” effect. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Nature-Inspired Drone Swarming for Wildfires Suppression Considering Distributed Fire Spots and Energy Consumption
Published 2024“…Our quantitative tests show that the improved model has the best coverage (95.3%, 84.3% and 65.8%, respectively) compared to two other methods Levy Flight (LF) algorithm and Particle Swarm Optimization (PSO), which use the same initial parameter values. …”
Article -
5
Vehicle pick-up and drop-off schedule optimization in a university setting
Published 2024“…A simulated annealing-based multi-directional iterative local search algorithm is employed for solution optimization. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
7
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
8
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
Published 2012“…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
Get full text
Get full text
Thesis -
9
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…In order to train Ridgelet probabilistic neural network, a modified differential evolution algorithm with new mutation phase, crossover process, and selection mechanism is introduced. …”
Get full text
Get full text
Thesis -
10
Modelling of assembly line balancing with energy consumption
Published 2023“…Based on the finding, we could achieve the same results on the computational method along with the manual hand calculation for the evaluated total energy and objective functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Pid-aco vibration controller with magnetorheological damper for wind turbine tower / Mahmudur Rahman
Published 2019“…Next, PID control parameters are optimized with ACO method based on the vibration displacement as objective function to achieve the optimal damping force which is used to encounter vibrations under different excitation frequencies and loading conditions. …”
Get full text
Get full text
Get full text
Thesis -
12
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
13
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…Therefore, the SMA method is redesigned for optimal location and sizing based on the total active power loss of the systems. …”
Get full text
Get full text
Thesis -
14
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
15
Opposition-based Whale Optimization Algorithm
Published 2018“…The OWOA use the Opposition-based method to enhance Whale Optimization Algorithm (WOA) performance. …”
Get full text
Get full text
Get full text
Article -
16
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
Get full text
Get full text
Article -
17
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…GA is a widely used optimization algorithm based on the concept of survival of the fittest. …”
Get full text
Get full text
Thesis -
18
Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
Published 2010“…This autonomous system improves the performance of the current Intrusion Prevention System (IPS) and carries on system continuity by using the Self–Healing (SH) mechanism.…”
Get full text
Get full text
Conference or Workshop Item -
19
Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz
Published 2016“…Therefore, optimization methods are often used in the sizing algorithms for such systems. …”
Get full text
Get full text
Thesis -
20
Firefly algorithm for optimal sizing of stand-alone photovoltaic system / Nur Izzati Abdul Aziz
Published 2016“…Therefore, optimization methods are often used in the sizing algorithms for such systems. …”
Get full text
Get full text
Thesis
