Search Results - (( developing security optimization algorithm ) OR ( java visualization using algorithm ))
Search alternatives:
- security optimization »
- developing security »
- java visualization »
- using algorithm »
-
1
A performance analysis of association rule mining algorithms
Published 2016“…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
Get full text
Get full text
Conference or Workshop Item -
2
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
3
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…For wireless sensor network (WSN) integrated dynamic IoT networks, this paper presents a trust-aware secure Ant colony optimization (ACO)-based routing algorithm to provide security while searching for an energy-efficient optimal routing path. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Visdom: Smart guide robot for visually impaired people
Published 2025“…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…An enhanced security algorithm is developed on top of MIPv6 RO to secure data. …”
Get full text
Get full text
Conference or Workshop Item -
6
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare a safe communication between MN and CN. …”
Get full text
Get full text
Get full text
Article -
8
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
Get full text
Get full text
Thesis -
9
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…In this paper, a secure bio-inspired WSN (Wireless Sensor Network) routing protocol based on ant colony optimization (ACO) algorithm for IoT has been proposed and analyzed to find secure and optimal path that is energy-efficient as well as aiming at providing trust in IoT environment. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad...
Published 2019“…Hence, this thesis presents a new metaheuristic optimisation technique for solving optimal FACTS devices allocation problem for voltage security control. …”
Get full text
Get full text
Thesis -
11
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare safe communication between MN and CN. …”
Get full text
Get full text
Conference or Workshop Item -
12
Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks
Published 2016“…The new method is called the Daddy Long-Legs Algorithm (PGO-DLLA), which modifies the standard AODV and optimizes the routing process. …”
Get full text
Get full text
Get full text
Thesis -
13
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
14
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
Get full text
Get full text
Thesis -
15
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
16
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
17
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
Get full text
Get full text
Get full text
Article -
18
Comparative analysis of firefly algorithm for solving optimization problems
Published 2017Get full text
Get full text
Book Section -
19
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Algorithms are developed for a simulated mobile robot that uses an array of range finders for navigation. …”
Get full text
Get full text
Monograph -
20
Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA
Published 2023“…In this study, a new security system design for securing GSM messaging with a lightweight PRINCE algorithm Intellectual Property (IP) Core using Field Programmable Gate Arrays (FPGA) is proposed. …”
Article
