Search Results - (( data protection learning algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- protection learning »
- learning algorithm »
- java simulation »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
2
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
3
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
5
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
7
Machine learning and deep learning approaches for cybersecurity: a review
Published 2022“…This paper reviewed intrusion detection systems and discussed what types of learning algorithms machine learning and deep learning are using to protect data from malicious behavior. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
9
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…Firstly, the data mining approach of the integrated-Rough-Set-and-Genetic-Algorithm is used to discover the relay CD-decision algorithm. …”
Get full text
Get full text
Article -
10
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The relay association rule had also been verified as being a reliable hypothesis of relay operation characteristics that was much sought after and easily understood by the protection engineers. The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis -
11
On protecting data storage in mobile cloud computing paradigm
Published 2014“…However, these passwords and algorithms eventually get cracked by the expert hackers who mostly spend their entire time learning the algorithms and the way to get through the password-protected frameworks. …”
Get full text
Get full text
Get full text
Article -
12
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…The coding is designed in such a way that there is a malicious attack to destroy the data. The system will automatically protect data and thus retrieve data at the end of the system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Advanced machine learning algorithm to predict the implication of climate change on groundwater level for protecting aquifer from depletion
Published 2025“…Therefore, the current study aimed to propose an accurate GWL prediction model using advanced machine learning (ML) algorithms in five populated towns, namely Jenderam, Bangi, Beranang, Kajang, and Paya Indah Wetland which are in Selangor, Malaysia. …”
Article -
17
-
18
Water quality monitoring using machine learning and IoT: a review
Published 2024“…ML algorithms can analyze large volumes of water quality data, enabling data-centric approaches to designing, supervising, simulating, assessing, and refining various water treatment and management systems. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…The BayesNet provides the best integrated MLADR fault classifier model better at a 5 % significance level than other deployed algorithms in the intelligent supervised learning model realization. …”
Get full text
Get full text
Thesis -
20
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
“…The anonymized files go through the classification process by some machine-learning algorithms i.e., Naive Bayes, J48 and neural network in order to check a balance between data anonymity and data utility. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
