Search Results - (( data protection based algorithm ) OR ( java based optimization algorithm ))
Search alternatives:
- protection based »
- java »
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The optimization of a computationally intensive algorithm such as this on a mobile platform is challenging due to the limited resources available. …”
Get full text
Get full text
Conference or Workshop Item -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
3
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
4
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
5
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). The study compares the performance of WOA with various existing strategies, such as Greedy, Density, TVG, Union, ParaOrder, ReqOrder, ITTDG, AURA, Java Algorithm (CTJ), TTSGA, and AFA. …”
Get full text
Get full text
Get full text
Article -
6
A heuristics approach for classroom scheduling using genetic algorithm technique
Published 2017“…The proposed of heuristics approach will prompt a superior utilization of the accessible classroom space for a given time table of courses at the university. Genetic Algorithm through Java programming languages were used in this study and aims at reducing the conflicts and optimizes the fitness. …”
Get full text
Get full text
Article -
7
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
8
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The relay association rule had also been verified as being a reliable hypothesis of relay operation characteristics that was much sought after and easily understood by the protection engineers. The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis -
9
-
10
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…This paper investigates the implementation of a novel data mining approach of integrated-Rough-Set-and-Genetic-Algorithm based rule discovery and Rule Quality Measure to hypothesize expected relay behavior in the form of an association rule from digital protective relay’s resident event report. …”
Get full text
Get full text
Article -
11
Discovering decision algorithm from a distance relay event report
Published 2009“…In this study rough-set-based data mining strategy was formulated to discover distance relay decision algorithm from its resident event report. …”
Get full text
Get full text
Get full text
Article -
12
Protection of the texts using Base64 and MD5
Published 2012“…The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. …”
Get full text
Get full text
Get full text
Article -
13
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
14
A random search based effective algorithm for pairwise test data generation
Published 2011“…This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
16
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
Get full text
Get full text
Get full text
Article -
17
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
18
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
19
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
User authentication for mobile devices using motion sensors based on Moore’s neighborhood / Muhammad Asyraf Akop
Published 2017“…However, the smartphone also is a personal device which means it contains a lot of confidential data. Therefore it needs some kind of protection to avoid unauthorized access to the data inside. …”
Get full text
Get full text
Student Project
