Search Results - (( software mitigation method algorithm ) OR ( java application swarm algorithm ))

Refine Results
  1. 1

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
    Get full text
    Get full text
    Article
  2. 2

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…To improve SDN's resilience and performance, early detection, mitigation strategies, and structured approaches are necessary. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region by Fanos, Ali Mutar

    Published 2016
    “…The result shows the barrier in suggested location can effectively aid in rockfall hazard mitigation. The outcomes of this study prove the ability of the proposed and applied methods to make valid detection and prediction for rockfall phenomena. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Electricity distribution network for low and medium voltages based on evolutionary approach optimization by Hasan, Ihsan Jabbar

    Published 2015
    “…It has been utilized to demonstrate the effectiveness of the PSO method to improve the voltage profile and minimize the cost by mitigating the total losses of the network.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…—In today's digital landscape, the identification of malicious software has become a crucial undertaking. The evergrowing volume of malware threats renders conventional signature-based methods insufficient in shielding against novel and intricate attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…In today's digital landscape, the identification of malicious software has become a crucial undertaking. The evergrowing volume of malware threats renders conventional signature-based methods insufficient in shielding against novel and intricate attacks. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    An analytical tool for computing perimeter based on visual and coordinates analysis by Salim Nasir, Mohd Agos, Sadikin, Zubaidah, Panji, Elaziera, Mohd Rohaidi, Nur Nadhirah, Harun, Nurzalina, Rathi, Sidik

    Published 2024
    “…Leveraging advanced mathematical algorithms, including a straightforward formula for determining distances between points, PeriGo ensures precise results while mitigating the risk of human error. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    A Hybrid Machine Learning and Optimisation-Based Model for Predicting the Success of Business-To-Consumer Software Development Projects in Indonesia by Setiawan, Rudi

    Published 2025
    “…Motivated by this challenge, this research aims to advance the predictive capability of software project success by developing an integrated artificial intelligence-based model, contextualized within B2C E-Business software projects in Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Optimal protection relay coordination for overcurrent relays in radial system / Mohd Azri Kasdi by Mohd Azri, Kasdi

    Published 2018
    “…The studies are conducted by using MATLAB software to implement the optimization method using Particle Swarm Optimization (PSO). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Optimal Maintenance Scheduling for Multi-Component E-Manufacturing System by Arab, Ali

    Published 2009
    “…Then, using genetic algorithm-based software which is called SimRunner and has been embedded by ProModel, the scheduling optimization procedure is run to find optimum maintenance schedule. …”
    Get full text
    Get full text
    Thesis