Search Results - (( developing data protection algorithm ) OR ( java optimization techniques algorithm ))
Search alternatives:
- optimization techniques »
- protection algorithm »
- java optimization »
- developing data »
-
1
-
2
-
3
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
4
Hybrid genetic algorithm for improving fault localization
Published 2018“…Genetic algorithm (GA) is well known in finding an optimal solution to a problem while local search is capable of removing duplication. …”
Get full text
Get full text
Get full text
Article -
5
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
6
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005“…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
Get full text
Get full text
Thesis -
7
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
8
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
9
Examination Timetabling Using Genetic Algorithm Case Study : KUiTTHO
Published 2005“…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
Get full text
Get full text
Get full text
Thesis -
10
Improving Class Timetabling using Genetic Algorithm
Published 2006“…We have targeted the research on class timetabling problem. Hence, Genetic Algorithm (GA) is used as one of the most popular optimization solutions. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…Therefore, numerous factors and techniques have been used to optimize the prioritization process. …”
Get full text
Get full text
Get full text
Article -
13
State-of-the-art in techniques of text digital watermarking: challenges and limitations
Published 2016“…Various types of data, including images, videos, audio and text documents, have given cause for the development of different methods for their protection. …”
Get full text
Get full text
Get full text
Article -
14
-
15
-
16
Development of Lightning Protection System (LPS) Designing Tool
Published 2015“…The tool would be developed and conducted by using Microsoft Excel 2010 since the algorithm was fit to be formulated in this software. …”
Get full text
Get full text
Final Year Project -
17
Novel rule base development from IED-resident big data for protective relay analysis expert system
Published 2016“…The developed PRAY runs its relay analysis by, first, validating whether a protective relay undertest operates correctly as expected by way of comparison between hypothesized and actual relay behavior. …”
Get full text
Get full text
Book Section -
18
A parallel XTS encryption mode of operation
Published 2009“…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Conference or Workshop Item -
19
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article
