Search Results - (( using evolution path algorithm ) OR ( software mitigation method algorithm ))

Refine Results
  1. 1

    The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment by Kok, Kai Yit

    Published 2016
    “…Significant research has been conducted on Unmanned Aerial Vehicle (UAV) path planning using evolutionary algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), and Biogeographic-Based Optimization (BBO). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim by Hashim, Siti Zuraifah

    Published 2007
    “…In this paper, GA has been applied to find the minimum path, then result will be compared with Dijkstra's algorithm are presented.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Literature Review of Optimization Techniques for Chatter Suppression In Machining by A. R., Yusoff, Mohamed Reza Zalani, Mohamed Suffian, Mohd Yusof, Taib

    Published 2011
    “…In this paper, it can be observed that for chatter suppression, optimization focuses on spindle design, tool path, cutting process, and variable pitch. Various algorithms can be applied in the optimization of machining problems; however, Differential Evolution is the most appropriate for use in chatter suppression, being less time consuming, locally optimal, and more robust than both Genetic Algorithms, despite their wide applications, and Sequential Quadratic Programming, which is a famous conventional algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Comparative analysis of spiral dynamic algorithm and artificial bee colony optimization for position control of flexible link manipulators by Nor Maniha, Abdul Ghani, Nizaruddin, M. Nasir, Azrul Azim, Abdullah Hashim

    Published 2024
    “…Interestingly, the manipulator's behaviours using the spiral dynamics algorithm for PID controller tuning were superior to those using alternative methods. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Fingerprint frontier: the evolution of biometric security by Khalifa, Othman Omran

    Published 2023
    “…The author believes that "Fingerprint Frontier: The Evolution of Biometric Security" will serve as a complete reference, shining light on the current landscape while exposing potential future paths in this ever-changing subject. …”
    Get full text
    Get full text
    Get full text
    Book
  10. 10

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…To improve SDN's resilience and performance, early detection, mitigation strategies, and structured approaches are necessary. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Hybrid genetic algorithm with multi-parents recombination for job shop scheduling problems / Ong Chung Sin by Ong, Chung Sin

    Published 2013
    “…This mechanism is restricted to search the possible solutions in a critical path. Modification on the path by using neighborhood search significantly reduces the total length of the makespan. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Soliton cellular automata constructed from a Uq(Dn[1])-crystal Bn,1 and kirillov-reshetikhin type bijection for Uq(E6[1])-crystal B6,1 by Mohamad, Mahathir

    Published 2012
    “…The algorithm only uses the structure of the crystal graph, hence could also be applied for other exceptional types. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Electricity distribution network for low and medium voltages based on evolutionary approach optimization by Hasan, Ihsan Jabbar

    Published 2015
    “…It has been utilized to demonstrate the effectiveness of the PSO method to improve the voltage profile and minimize the cost by mitigating the total losses of the network.…”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…The IEM algorithm uses the attraction-repulsion mechanism to change the positions of solutions towards the optimality. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region by Fanos, Ali Mutar

    Published 2016
    “…The result shows the barrier in suggested location can effectively aid in rockfall hazard mitigation. The outcomes of this study prove the ability of the proposed and applied methods to make valid detection and prediction for rockfall phenomena. …”
    Get full text
    Get full text
    Thesis