Search Results - (( developing security optimization algorithm ) OR ( java implementation search algorithm ))

Refine Results
  1. 1

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…For wireless sensor network (WSN) integrated dynamic IoT networks, this paper presents a trust-aware secure Ant colony optimization (ACO)-based routing algorithm to provide security while searching for an energy-efficient optimal routing path. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare a safe communication between MN and CN. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…In addition, the Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10

    Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat by Minhat, Abdul Rahman

    Published 2008
    “…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2021
    “…In this paper, a secure bio-inspired WSN (Wireless Sensor Network) routing protocol based on ant colony optimization (ACO) algorithm for IoT has been proposed and analyzed to find secure and optimal path that is energy-efficient as well as aiming at providing trust in IoT environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad... by Mohamad Zamani, Mohamad Khairuzzaman

    Published 2019
    “…Hence, this thesis presents a new metaheuristic optimisation technique for solving optimal FACTS devices allocation problem for voltage security control. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare safe communication between MN and CN. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks by Ghathwan, Khalil Ibrahim

    Published 2016
    “…The new method is called the Daddy Long-Legs Algorithm (PGO-DLLA), which modifies the standard AODV and optimizes the routing process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. But more metaheuristics will be included in future research. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
    Get full text
    Get full text
    Article
  18. 18

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Thesis
  19. 19

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis