Search Results - (( variable detection packet algorithm ) OR ( variable interactions based algorithm ))
Search alternatives:
- variable interactions »
- variable detection »
- interactions based »
- detection packet »
- packet algorithm »
-
1
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…The performance of the proposed framework has been analyzed mathematically and through simulations which show the robustness of VFHO in terms of signaling cost, endto- end packet delivery cost, overall handoff latency, and packet loss based on various system variables. …”
Get full text
Get full text
Thesis -
2
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…This study aims to improve the detection of an anomalous behaviour by identifying the outlier data points in the packets more precisely, maximizes the detection of packets with similar behaviours more accurately while reducing the detection time. …”
Get full text
Get full text
Thesis -
3
A variable combinatorial test suite strategy based on modified greedy algorithm
Published 2015“…This proposed will suggest a new CIT strategy based on a modified greedy algorithm (MGA) with addressing the supporting of variable strength interaction to generate a satisfactory test suite size.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
A new variable strength t-way strategy based on the cuckoo search algorithm
Published 2019“…Complementing existing works, this paper proposes a new variable strength cuckoo search algorithm, called VCS. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
Get full text
Get full text
Thesis -
6
CTJ: Input-output based relation combinatorial testing strategy using Jaya algorithm
Published 2019“…Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
7
Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation
Published 2018“…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation
Published 2018“…In real-world software testing, the input variables may vary in how strongly they interact, variable strength combinatorial interaction testing (VS-CIT) can exploit this for higher effectiveness. …”
Get full text
Get full text
Get full text
Book Chapter -
9
CTJ: Input-output based relation combinatorial testing strategy using Jaya algorithm
Published 2019“…Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025“…Therefore, a variable selection technique using a swarm-based Binary Bat algorithm is proposed. …”
Conference paper -
11
The performance of Taguchi�s T-method with binary bat algorithm based on great value priority binarization for prediction
Published 2023“…This paper proposes an optimization algorithm based on the Binary Bat algorithm methodology for replacing the conventional orthogonal array approach. …”
Article -
12
Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest
Published 2026“…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
Get full text
Get full text
Get full text
Article -
13
New synchronization protocol for distributed system with TCP extension
Published 2013“…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
Get full text
Get full text
Thesis -
14
Data driven neuroendocrine pid controller for mimo plants based adaptive safe experimentation dynamics algorithm
Published 2020“…However, control accuracy is insufficient because the secretion rate and control variable error are not able to interact directly and limits the controller capability. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
HABC: Hybrid artificial bee colony for generating variable T-way test sets
Published 2020“…This paper proposed a hybrid artificial bee colony (HABC) strategy based on the hybrid artificial bee colony algorithm and practical swarm optimization to generate optimal test suite of variable strength interaction. …”
Get full text
Get full text
Article -
18
HABC: Hybrid artificial bee colony for generating variable T-way test sets
Published 2020“…This paper proposed a hybrid artificial bee colony (HABC) strategy based on the hybrid artificial bee colony algorithm and practical swarm optimization to generate optimal test suite of variable strength interaction. …”
Get full text
Get full text
Article -
19
A parallel genetic algorithm-based TSK-Fuzzy system for dynamic car-following modeling
Published 2009“…This paper presents the application of Parallel Genetic Algorithm (PGA)-based Takagi Sugeno Kang (TSK)-Fuzzy approach for dynamic car-following modeling in the traffic simulation software. …”
Get full text
Get full text
Article -
20
Short-term electricity price forecasting in deregulated electricity market based on enhanced artificial intelligence techniques / Alireza Pourdaryaei
Published 2020“…An important contribution of the proposed method is modeling of interaction in addition to relevancy and redundancy based on information-theoretic criteria for the feature selection. …”
Get full text
Get full text
Get full text
Thesis
