Search Results - (( variable detection packet algorithm ) OR ( evolution optimisation based algorithm ))
Search alternatives:
- evolution optimisation »
- variable detection »
- optimisation based »
- detection packet »
- packet algorithm »
-
1
-
2
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…This study aims to improve the detection of an anomalous behaviour by identifying the outlier data points in the packets more precisely, maximizes the detection of packets with similar behaviours more accurately while reducing the detection time. …”
Get full text
Get full text
Thesis -
3
Performance evaluation and benchmarking of an extended computational model of ant colony system for DNA sequence design
Published 2014“…Ant colony system (ACS) algorithm is one of the biologically inspired algorithms that have been introduced to effectively solve a variety of combinatorial optimisation problems. …”
Get full text
Get full text
Get full text
Article -
4
A competitive co-evolutionary approach for the nurse scheduling problem
Published 2026“…The competitive approach further exhibits smoother convergence behaviour across generations, indicating stronger optimisation dynamics and improved robustness. These findings demonstrate that competitive co-evolution provides an effective and practical alternative to static fitness-based evolutionary methods for nurse scheduling, with broader applicability to healthcare scheduling and constraint optimisation problems.…”
Get full text
Get full text
Get full text
Article -
5
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
6
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Stock market turning points rule-based prediction / Lersak Photong … [et al.]
Published 2021“…Finally, rule-based optimisation techniques such as Particle Swarm Optimization (PSO), Differential Evolution (DE) and Grey Wolf Optimizer (GWO) were used to minimise the amount of time employed in the stock market turning points prediction. …”
Get full text
Get full text
Book Section -
8
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…The performance of the proposed framework has been analyzed mathematically and through simulations which show the robustness of VFHO in terms of signaling cost, endto- end packet delivery cost, overall handoff latency, and packet loss based on various system variables. …”
Get full text
Get full text
Thesis -
9
B-spline curve fitting with different parameterization methods
Published 2020“…After generating control points, distance between the generated and original data points is used to identify the error of the algorithm. Later, genetic algorithm and differential evolution optimization are used to optimise the error of the curve. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods
Published 2017“…This study sought to examine the performance of three newly proposed techniques, for reliability assessment of the power systems, namely Disparity Evolution Genetic Algorithm (DEGA), Binary Particle Swarm Optimisation (BPSO), and Differential Evolution Optimization Algorithm (DEOA). …”
Get full text
Get full text
Get full text
Thesis -
11
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
12
Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest
Published 2026“…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
Get full text
Get full text
Get full text
Article -
13
New synchronization protocol for distributed system with TCP extension
Published 2013“…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
Get full text
Get full text
Thesis -
14
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…In addition, a new optimisation model for finding optimum parameter values in the MEDF and an algorithm for transmuting a 1D quantitative feature into a respective categorical feature are developed to facilitate the model. …”
Get full text
Get full text
Get full text
Article -
15
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
Get full text
Get full text
Thesis -
16
A self‐configured link adaptation for green LTE downlink transmission
Published 2015“…Current and next‐generation cellular networks require such interactive techniques in order to be self‐optimised without complex modifications.…”
Get full text
Get full text
Article -
17
Development of tool life prediction model of TiAlN coated tools during the high speed hard milling of AISI H13 steel
Published 2011“…Shunmugam et al. [7] also combined RSM with differential evolution and genetic algorithms to draw a comparison between these methods. …”
Get full text
Get full text
Get full text
Book Chapter
