Search Results - (( using evolution path algorithm ) OR ( software mitigation method algorithm ))
Search alternatives:
- software mitigation »
- mitigation method »
- method algorithm »
- using evolution »
- path algorithm »
-
1
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…Significant research has been conducted on Unmanned Aerial Vehicle (UAV) path planning using evolutionary algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), and Biogeographic-Based Optimization (BBO). …”
Get full text
Get full text
Thesis -
2
Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim
Published 2007“…In this paper, GA has been applied to find the minimum path, then result will be compared with Dijkstra's algorithm are presented.…”
Get full text
Get full text
Thesis -
3
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
4
-
5
The evolution and trend of chain code scheme
Published 2008Get full text
Get full text
Get full text
Article -
6
-
7
Literature Review of Optimization Techniques for Chatter Suppression In Machining
Published 2011“…In this paper, it can be observed that for chatter suppression, optimization focuses on spindle design, tool path, cutting process, and variable pitch. Various algorithms can be applied in the optimization of machining problems; however, Differential Evolution is the most appropriate for use in chatter suppression, being less time consuming, locally optimal, and more robust than both Genetic Algorithms, despite their wide applications, and Sequential Quadratic Programming, which is a famous conventional algorithm.…”
Get full text
Get full text
Get full text
Article -
8
Comparative analysis of spiral dynamic algorithm and artificial bee colony optimization for position control of flexible link manipulators
Published 2024“…Interestingly, the manipulator's behaviours using the spiral dynamics algorithm for PID controller tuning were superior to those using alternative methods. …”
Get full text
Get full text
Get full text
Article -
9
Fingerprint frontier: the evolution of biometric security
Published 2023“…The author believes that "Fingerprint Frontier: The Evolution of Biometric Security" will serve as a complete reference, shining light on the current landscape while exposing potential future paths in this ever-changing subject. …”
Get full text
Get full text
Get full text
Book -
10
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…To improve SDN's resilience and performance, early detection, mitigation strategies, and structured approaches are necessary. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Hybrid genetic algorithm with multi-parents recombination for job shop scheduling problems / Ong Chung Sin
Published 2013“…This mechanism is restricted to search the possible solutions in a critical path. Modification on the path by using neighborhood search significantly reduces the total length of the makespan. …”
Get full text
Get full text
Get full text
Thesis -
12
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
Get full text
Get full text
Thesis -
13
A novel high performance routing technique for cross-referencing DMFBs
Published 2012Get full text
Working Paper -
14
Soliton cellular automata constructed from a Uq(Dn[1])-crystal Bn,1 and kirillov-reshetikhin type bijection for Uq(E6[1])-crystal B6,1
Published 2012“…The algorithm only uses the structure of the crystal graph, hence could also be applied for other exceptional types. …”
Get full text
Get full text
Thesis -
15
IoT-based botnet attacks systematic mapping study of literature
Published 2024journal::journal article -
16
Electricity distribution network for low and medium voltages based on evolutionary approach optimization
Published 2015“…It has been utilized to demonstrate the effectiveness of the PSO method to improve the voltage profile and minimize the cost by mitigating the total losses of the network.…”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…The IEM algorithm uses the attraction-repulsion mechanism to change the positions of solutions towards the optimality. …”
Get full text
Get full text
Thesis -
19
-
20
Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region
Published 2016“…The result shows the barrier in suggested location can effectively aid in rockfall hazard mitigation. The outcomes of this study prove the ability of the proposed and applied methods to make valid detection and prediction for rockfall phenomena. …”
Get full text
Get full text
Thesis
