Search Results - (( parallel optimization modified algorithm ) OR ( variable detection packet algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…This study aims to improve the detection of an anomalous behaviour by identifying the outlier data points in the packets more precisely, maximizes the detection of packets with similar behaviours more accurately while reducing the detection time. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Parallel multiple tabu search for multiobjective Urban Transit Scheduling Problem by Uvaraja, Vikneswary, Lai, Soon Lee, Abd Rahmin, Nor Aliza, Hsin, Vonn Seow

    Published 2020
    “…A set covering model was then adopted to minimize the number of buses and drivers simultaneously. A parallel tabu search algorithm was proposed to solve the problem by modifying the initialization process and incorporating intensification and diversification approaches to guide the search effectively from the different feasible domain in finding optimal solutions with lesser computational effort. …”
    Get full text
    Get full text
    Article
  4. 4

    Development of optimization Alghorithm for uncertain non-linear dynamical system by Abdul Aziz, Mohd. Ismail, Yaacob, Nazeeruddin, Mohd. Said, Norfarizan, Hamzah, Nor Hazadura

    Published 2004
    “…An algorithm that definitely can satisfy the objectives is the Dynamic Integrated Systems Optimization and Parameter Estimation (DISOPE) algorithm. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Review of the grey wolf optimization algorithm: variants and applications by Liu, Yunyun, As’arry, Azizan, Hassan, Mohd Khair, Hairuddin, Abdul Aziz

    Published 2023
    “…The paper begins with a concise introduction to the GWO, providing insight into its natural establishment and conceptual framework for optimization. It then lays out the theoretical foundation and key procedures involved in the GWO, following which it comprehensively examines the most recent iterations of the algorithm and categorizes them into parallel, modified, and hybridized variations. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    A modified artificial neural network (ANN) algorithm to control shunt active power filter (SAPF) for current harmonics reduction by Sabo, Aliyu, Abdul Wahab, Noor Izzri, Mohd Radzi, Mohd Amran, Mailah, Nashiren Farzilah

    Published 2013
    “…The novelty control design is an artificial neural network (ANN) adopting a modified mathematical algorithm (a modified delta rule weight-updating W-H) and a suitable alpha value (learning rate value) which determines the filters optimal operation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Review of the grey wolf optimization algorithm: variants and applications by Liu, Yunyun, As’arry, Azizan, Hassan, Mohd Khair, Hairuddin, Abdul Aziz, Mohamad, Hesham

    Published 2024
    “…The paper begins with a concise introduction to the GWO, providing insight into its natural establishment and conceptual framework for optimization. It then lays out the theoretical foundation and key procedures involved in the GWO, following which it comprehensively examines the most recent iterations of the algorithm and categorizes them into parallel, modified, and hybridized variations. …”
    Get full text
    Get full text
    Article
  10. 10

    Development of a real-time clutch transition strategy for a parallel hybrid electric vehicle by Vu, Trieu Minh

    Published 2011
    “…Model predictive control (MPC) has been used for this model and tested with different control horizons and weighting factors to verify the ability of MPC to control the vehicle speeds for the clutch engagement. Some modified MPC algorithms with softened constraints and with output regions have been also studied to improve the robustness and the ability of this controller. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  11. 11

    OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA by DORE RAJA, ANAND A RAJA

    Published 2004
    “…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks by Solouk, Vahid

    Published 2009
    “…The performance of the proposed framework has been analyzed mathematically and through simulations which show the robustness of VFHO in terms of signaling cost, endto- end packet delivery cost, overall handoff latency, and packet loss based on various system variables. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…This research was aimed at the investigation of a new degree six chordal ring, the optimised degree six 3-modified chordal ring CHR6o3. A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Optimization Of Twofish Encryption Algorithm On FPGA by Raja, Ananda Raja Dore, Zain Ali, Noohul Basheer, Hussin, Fawnizu Azmadi

    Published 2005
    “…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
    Get full text
    Conference or Workshop Item
  15. 15

    Automatic generic process migration system in linux by Zarrabi, Amirreza

    Published 2012
    “…A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Hybrid metaheuristics for QOS-aware service composition / Hadi Naghavipour by Hadi , Naghavipour

    Published 2022
    “…As a result of this mapping study, five major hybridization strategies were identified in which two-third of solutions have been based on modifying algorithm operators or integration with another metaheuristic. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest by Ghulam Hussain, Muhammad Thaqif, Shafeeq Lone, Aman, Maspo, Nur-Adib, Attarbashi, Zainab

    Published 2026
    “…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…In the first group, the conventional techniques are combined with other techniques and the second group is based on the optimization methods. One of the main challenges of MPPT techniques under PSCs is ability of the algorithms to find the GMPP faster with minimal oscillation in power. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
    Get full text
    Get full text
    Thesis