Search Results - (( developing developing prevention algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- developing developing »
- developing prevention »
- prevention algorithm »
- java implementation »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Development of a new algorithm for segmentation of flotation froth images
Published 2014“…In the paper, the marker-based watershed method is modified to prevent oversegmentation of large bubbles. The developed algorithm is validated using some froth images captured at different operating conditions, so the results indicate that the method can segment the mixture of big and small bubbles effectively.…”
Get full text
Get full text
Article -
7
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
8
Early prediction of dengue outbreak using Artificial Neural Network (ANN) / Muhammad Sirajuddin Ismail
Published 2024“…This study aims to investigate the requirements of utilizing the Artificial Neural Network algorithm for prediction of dengue outbreak. The objective is to develop Dengue Outbreak Prediction System using Artificial Neural Network algorithm and evaluate its performance. …”
Get full text
Get full text
Thesis -
9
Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage
Published 2010“…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
10
Ensemble dual recursive learning algorithms for identifying flow with leakage
Published 2010“…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
11
Optimal load shedding in power system using back tracking search algorithm
Published 2024text::Final Year Project -
12
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…Secondly, specification language, system design, mathematical and computational models for IPS and SH system are established, which are based upon nonlinear classification, prevention predictability trust, analysis, self-adaptation and self-healing algorithms. …”
Get full text
Get full text
Thesis -
13
Development of novel distance relay scheme to prevent false tripping during power swing
Published 2017“…The objectives of the research are to develop new intelligent schemes for preventing false relay operation during power swing. …”
Get full text
Get full text
Thesis -
14
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
15
Algorithm for the legal regulation of internet financial crime
Published 2024“…To prevent crime, attention towards effective control of Internet finance crime has grown, emphasizing the protection of consumers’ rights, reduction of economic damage, and promotion of Internet finance development. …”
Get full text
Get full text
Get full text
Article -
16
Prevention of Textual Plagiarism Application
Published 2011“…This project is mainly about detecting and preventing plagiarism among UTP students. In order to achieve this, a system which named as Prevention of Textual Plagiarism Application will be developed which provides the capability to detect similarities between documents submitted by students. …”
Get full text
Get full text
Final Year Project -
17
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
Classification model for hotspot occurrences using spatial decision tree algorithm
Published 2013“…Developing a predictive model for forest fires occurrence is an important activity in a fire prevention program. …”
Get full text
Get full text
Get full text
Article -
19
Development of novel distance relay scheme to prevent false tripping during power swing / Nor Zulaily Mohamad
Published 2017“…The objectives of the research are to develop new intelligent schemes for preventing false relay operation during power swing. …”
Get full text
Get full text
Book Section -
20
Development of an effective clustering algorithm for older fallers
Published 2022“…The purpose of this study was, therefore, to develop a clustering-based algorithm to determine falls risk. …”
Get full text
Get full text
Article
