Search Results - (( based classification protocol algorithm ) OR ( using optimization method algorithm ))

Refine Results
  1. 1

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Article
  3. 3

    Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…This thesis proposes a TLS-based malware detection (TLSMalDetect) approach based on ML classification to address flow feature utilization limitations in related work. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network by Ahmed Al-Doori, Ahmed Jamal

    Published 2018
    “…In order to address the issue in this research presents a novel protocol based on equal power consumption at all network nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Fuzzy logic based link status classification for efficient multipath routing in multi-hop wireless mesh networks by Shah, P.A., Hasbullah, H.B., Rafique, S., Rehman, S.U., Jung, L.T.

    Published 2014
    “…This paper presents a new fuzzy logic based link status classification mechanism for use with multipath routing protocols in multi-hop wireless networks like WMNs. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    A Patent Technique of Jaccard Discrete (J-DIS) Similarity Clustering Algorithm by Imtiaz, Sharjeel, Saadiah, Yahya

    Published 2014
    “…Mostly, k-Means algorithm finds out similarity between the object based on distance vector for smallest dataset. …”
    Get full text
    Get full text
    Journal
  10. 10

    Energy-efficient intrusion detection in wireless sensor network by Salehian, Solmaz, Masoumiyan, Farzaneh, Udzir, Nur Izura

    Published 2012
    “…Attacks can occur from any direction and any node in WSNs, so one crucial security challenge is to detect networks' intrusion. There are several algorithms for building Intrusion Detection Systems (IDS) based on different WSN routing protocol classifications with respect to energy-efficient manner. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Application of genetic algorithm methods to optimize flowshop sequencing problem by Mohd Fadil, Md Sairi

    Published 2008
    “…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management by Khan, Fazeel Ahmed, Abubakar, Adamu

    Published 2024
    “…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Wind farm reactive power optimization by using imperialist competitive algorithm by Soheilirad, Mohammadsoroush, Hizam, Hashim, Farzan, Payam, Hojabri, Mojgan, Fallah, Seyedeh Narjes, Soheilirad, G.

    Published 2013
    “…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    SA-EVPS ALGORITHM FOR DISCRETE SIZE OPTIMIZATION OF THE 582-BAR SPATIAL TRUSS STRUCTURE by Paknahad, M., Hosseini, P., Hakim, S.J.S

    Published 2023
    “…Nowadays, approximate optimization methods are widely used. This study utilized the Self Adaptive Enhanced Vibrating Particle System (SA-EVPS) algorithm as an approximate optimization method, since the EVPS algorithm requires experimental parameters. …”
    Get full text
    Get full text
    Article
  17. 17

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…Two methods of optimization are used for CBLL. They are Cross Entropy and also Genetic Algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Wind Farm Reactive Power Optimization by Using Imperialist Competitive Algorithm by Soheilirad, M., Hizam, H., Farzan, P., Hojabri, Mojgan, Fallah, S. N., Soheilirad, G.

    Published 2013
    “…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz by Abdul Aziz, Nurizzati

    Published 2016
    “…Therefore, optimization methods are often used in the sizing algorithms for such systems. …”
    Get full text
    Get full text
    Thesis