Search Results - (( variable detection packet algorithm ) OR ( evolution optimisation based algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…This study aims to improve the detection of an anomalous behaviour by identifying the outlier data points in the packets more precisely, maximizes the detection of packets with similar behaviours more accurately while reducing the detection time. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Performance evaluation and benchmarking of an extended computational model of ant colony system for DNA sequence design by Zuwairie, Ibrahim, Mohd Falfazli, Mat Jusof, Mohd Zaidi, Mohd Tumari

    Published 2014
    “…Ant colony system (ACS) algorithm is one of the biologically inspired algorithms that have been introduced to effectively solve a variety of combinatorial optimisation problems. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A competitive co-evolutionary approach for the nurse scheduling problem by Mohamad Nazri, Maizatul Farhana, Mohd Yusoh, Zeratul Izzah, Basiron, Halizah, Daud, Azlina

    Published 2026
    “…The competitive approach further exhibits smoother convergence behaviour across generations, indicating stronger optimisation dynamics and improved robustness. These findings demonstrate that competitive co-evolution provides an effective and practical alternative to static fitness-based evolutionary methods for nurse scheduling, with broader applicability to healthcare scheduling and constraint optimisation problems.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A hyper-heuristic based strategy for image segmentation using multilevel thresholding by Luqman, Fakhrud Din, Shah Khalid, Kamal Zuhairi Zamli, Aftab Alam

    Published 2025
    “…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A hyper-heuristic based strategy for image segmentation using multilevel thresholding by Luqman, ., Fakhrud, Din, Shah, Khalid, Kamal Z., Zamli, Alam, Aftab

    Published 2025
    “…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Stock market turning points rule-based prediction / Lersak Photong … [et al.] by Photong, Lersak, Sukprasert, Anupong, Boonlua, Sutana, Ampant, Pravi

    Published 2021
    “…Finally, rule-based optimisation techniques such as Particle Swarm Optimization (PSO), Differential Evolution (DE) and Grey Wolf Optimizer (GWO) were used to minimise the amount of time employed in the stock market turning points prediction. …”
    Get full text
    Get full text
    Book Section
  8. 8

    Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks by Solouk, Vahid

    Published 2009
    “…The performance of the proposed framework has been analyzed mathematically and through simulations which show the robustness of VFHO in terms of signaling cost, endto- end packet delivery cost, overall handoff latency, and packet loss based on various system variables. …”
    Get full text
    Get full text
    Thesis
  9. 9

    B-spline curve fitting with different parameterization methods by Kheng, Jia Shen

    Published 2020
    “…After generating control points, distance between the generated and original data points is used to identify the error of the algorithm. Later, genetic algorithm and differential evolution optimization are used to optimise the error of the curve. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods by Kadhem, Athraa Ali

    Published 2017
    “…This study sought to examine the performance of three newly proposed techniques, for reliability assessment of the power systems, namely Disparity Evolution Genetic Algorithm (DEGA), Binary Particle Swarm Optimisation (BPSO), and Differential Evolution Optimization Algorithm (DEOA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest by Ghulam Hussain, Muhammad Thaqif, Shafeeq Lone, Aman, Maspo, Nur-Adib, Attarbashi, Zainab

    Published 2026
    “…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
    Get full text
    Get full text
    Thesis
  14. 14

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…In addition, a new optimisation model for finding optimum parameter values in the MEDF and an algorithm for transmuting a 1D quantitative feature into a respective categorical feature are developed to facilitate the model. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A self‐configured link adaptation for green LTE downlink transmission by Salman, Mustafa Ismael, Ng, Chee Kyun, Noordin, Nor Kamariah, Mohd Ali, Borhanuddin, Sali, Aduwati

    Published 2015
    “…Current and next‐generation cellular networks require such interactive techniques in order to be self‐optimised without complex modifications.…”
    Get full text
    Get full text
    Article
  17. 17

    Development of tool life prediction model of TiAlN coated tools during the high speed hard milling of AISI H13 steel by Amin, A. K. M. Nurul, Hafiz, A.M. Khalid, Lajis, M. A.

    Published 2011
    “…Shunmugam et al. [7] also combined RSM with differential evolution and genetic algorithms to draw a comparison between these methods. …”
    Get full text
    Get full text
    Get full text
    Book Chapter