Search Results - (( developing agent connection algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- connection algorithm »
- developing agent »
- java application »
-
1
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
2
Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR)
Published 2013“…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
Get full text
Get full text
Get full text
Article -
3
Semantic-Based Scalable Decentralized Resource Discovery
Published 2010“…We develop a RD algorithm that optimizes the search of the resources on the network. …”
Get full text
Get full text
Conference or Workshop Item -
4
Analysis of a multilevel voltage-based coordinating controller for solar-wind energy generator: a simulation, development and validation approach
Published 2021“…The developed model has different tasks to perform when solar-wind energy sources both produce output voltages simultaneously, also contributing to solving the requirements of different synchronization algorithms for a multi-agent renewable energy system. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Semantic-Based Scalable Decentralized Grid Resource Discovery
Published 2009“…We develop a RD algorithm that optimizes the search of the resources on the network. …”
Get full text
Get full text
Conference or Workshop Item -
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
7
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…In addition, another two agents have been developed based on Monte Carlo simulation. …”
Get full text
Get full text
Thesis -
8
-
9
Enhanced Mobility Solution In Mobile Ipv6 Network
Published 2008“…The solution is important by enterprises in making decision to acquire internet connectivity for the purpose of connectivity redundancy and traffic load distribution optimization. …”
Get full text
Get full text
Thesis -
10
Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution
Published 2006“…The mutual information algorithms used in this work has been developed and experimented in the system and has proven to yield more accurate and stable results than other algorithms. …”
Get full text
Get full text
Thesis -
11
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…Likewise, the soft programmable switches that are directly connected to the controller running atop end host servers are attractive targets for attackers to initiate control plane flooding; apart from authorized but untrusted hosts. …”
Get full text
Get full text
Thesis
