Search Results - (( using detection packet algorithm ) OR ( parameter optimization sensor algorithm ))
Search alternatives:
- parameter optimization »
- optimization sensor »
- detection packet »
- packet algorithm »
- sensor algorithm »
- using detection »
-
1
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
2
The optimization of stepping stone detection: packet capturing steps
Published 2006“…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
Get full text
Get full text
Get full text
Article -
3
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…The main method is related to processing and filtering data packets using different types of packet filtering on network system and, more specifically, capturing and filtering data packets transmitted on high speed communications links for errors and attackers’ detection and signal integrity analysis. …”
Get full text
Get full text
Get full text
Thesis -
4
The optimization of stepping stone detection : packet capturing steps
Published 2006“…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
Get full text
Get full text
Get full text
Article -
5
The optimization of stepping stone detection: Packet capturing steps
Published 2006“…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism.The aim of the research is to improve the packet capturing step in stepping stone algorithm, thus, improve the response from overall detection and response system.The proposed method is to use small size of user buffer and kernel buffer.Experiments were conducted with two types of packet stream; i) 10 kbps and ii) 10 000 kbps data generated by Tfgen (packet generator) tools and nine combinations of different buffer sizes for each network packet stream were tested.Results from the experiment were analyzed. …”
Get full text
Get full text
Get full text
Article -
6
Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: a review paper
Published 2017“…The review shows that most of the algorithms used one parameter to find the optimal number of mobile agents in multi-agent itinerary planning without utilizing other parameters. …”
Get full text
Get full text
Get full text
Article -
7
Parameter adaptation for ant colony system in wireless sensor network
Published 2019“…The Ant Colony System (ACS) algorithm has been applied in solving packet routing problems in Wireless Sensor Networks (WSNs). …”
Get full text
Get full text
Get full text
Article -
8
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
Published 2017“…In addition, it is also aimed to improve the resource consumption of the packet-based detection approach. CHID applied attribute wrapper features evaluation algorithms that marked malicious flows for further analysis by the packet-based detection. …”
Get full text
Get full text
Get full text
Thesis -
9
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
Published 2010“…Hence, this thesis defines a new algorithm called the Distributed Packet Header Matching algorithm (DPHM), and a New Network Intrusion Detection Systems (NNIDS) platform using hybrid technology in order to increase the overall performance of SNORT-NIDS.…”
Get full text
Get full text
Thesis -
10
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Subsequently, NB+RF, a hybrid classification algorithm is used to distinguish similar and dissimilar content behaviours of a packet. …”
Get full text
Get full text
Thesis -
11
Whale optimization algorithm based on tent chaotic map for feature selection in soft sensors
Published 2025“…One of the powerful optimization algorithms that is used for feature selection is the Whale Optimization Algorithm (WOA), which is a nature-inspired metaheuristic optimization algorithm that mimics the social behavior of humpback whales. …”
Get full text
Get full text
Get full text
Article -
12
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…The IDBA-AFW evaluates the fitness of relay nodes based on multiple criteria, such as energy efficiency, throughput, and end-to-end delay. Both Bat Algorithm parameters and AFW parameters are adaptively tuned to balance exploration and exploitation throughout the optimization process. …”
Get full text
Get full text
Get full text
Thesis -
13
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006“…The second is RED (Random Early Detection), which drops incoming packets at a certain probability.…”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Effect Of The Addition Of Wastepaper To Concrete Mix
Published 2009“…Hence, this thesis defines a new algorithm called the Distributed Packet Header Matching algorithm (DPHM), and a New Network Intrusion Detection Systems (NNIDS) platform using hybrid technology in order to increase the overall performance of SNORT-NIDS.…”
Get full text
Get full text
Thesis -
15
Optimization of user comfort index for ambient intelligence using dynamic inertia weight artificial bees colony optimization algorithm
Published 2021“…In this work, these parameters are optimized using dynamic inertia weight artificial bees colony (DIW-ABC) optimization algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…Compared to the Ant Colony Optimization-Genetic Algorithm (ACO-GA) and Ant Colony Optimization- Hierarchical Clustering Mechanism (ACOHCM), the ACO algorithm shows superior power savings and efficiency. …”
Get full text
Get full text
Get full text
Thesis -
17
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…There are three new proposed algorithms introduced to address all three issues which resulted from using the OR approach in UWSNs. …”
Get full text
Get full text
Thesis -
18
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…There are two major phases of the protocol - route discovery and route maintenance Route discovery uses route request and route reply packets. Route maintenance uses route error packets and acknowledgments. …”
Get full text
Get full text
Thesis -
19
Embedded Ethernet System For Real-Time Communication
Published 2018“…The Ethernet network model is used to analyze the performance of the backoff algorithm in a different number of nodes. …”
Get full text
Get full text
Monograph -
20
