Sciweavers

151 search results - page 15 / 31
» Using Clustering Techniques to Improve the Performance of a ...
Sort
View
JCIT
2008
129views more  JCIT 2008»
13 years 7 months ago
An Enhanced tree based MAODV Protocol for MANETs using Genetic Algorithm
Multicast routing protocols in Mobile Ad-hoc Networks (MANETs) are emerging for wireless group communication which includes application such as multipoint data dissemination and m...
E. Baburaj, V. Vasudevan
WCNC
2008
IEEE
14 years 2 months ago
Using Swarm Intelligence and Bayesian Inference for Aircraft Interrogation
: Sensor management deals with the efficient resource allocation to meet mission objectives of the application, air traffic control. A schedule for the sensors is constructed, whic...
Ganapathi Kamath, Xiang Ye, Lisa Ann Osadciw
SAB
2004
Springer
159views Optimization» more  SAB 2004»
14 years 1 months ago
Swarming Behavior Using Probabilistic Roadmap Techniques
While techniques exist for simulating swarming behaviors, these methods usually provide only simplistic navigation and planning capabilities. In this review, we explore the benefi...
O. Burçhan Bayazit, Jyh-Ming Lien, Nancy M....
PRICAI
2004
Springer
14 years 1 months ago
Constrained Ant Colony Optimization for Data Clustering
Processes that simulate natural phenomena have successfully been applied to a number of problems for which no simple mathematical solution is known or is practicable. Such meta-heu...
Shu-Chuan Chu, John F. Roddick, Che-Jen Su, Jeng-S...
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 1 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...