Search Results - (( evolution activation detection algorithm ) OR ( java implementation max algorithm ))
Search alternatives:
- evolution activation »
- activation detection »
- java implementation »
- implementation max »
- max algorithm »
-
1
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
2
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…Many algorithms have been implemented to solve the grid scheduling problem. …”
Get full text
Get full text
Get full text
Thesis -
3
A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach
Published 2012“…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
Get full text
Get full text
Get full text
Thesis -
4
Segmentation of Retinal Vasculature using Active Contour Models (Snakes)
Published 2009“…Active contour model (snake) that based on level sets, techniques of curve evolution, and Mumford-Shah functional for segmentation is then used to segment out the detected retinal vessel and produce a complete retinal vasculature. …”
Get full text
Get full text
Final Year Project -
5
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
Get full text
Get full text
Get full text
Article -
6
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The malicious software which is specifically designed to disrupt, damage, or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective. …”
Get full text
Get full text
Get full text
Article -
7
SG-PBFS : Shortest Gap-Priority Based Fair Scheduling technique for job scheduling in cloud environment
Published 2024“…To conduct this experiment, we employed the CloudSim simulator, which is implemented using the Java programming language.…”
Get full text
Get full text
Get full text
Get full text
Article -
8
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis -
9
Gripping controller design for a one-degree-of-freedom robotic hand model based on slip detection
Published 2016“…The robotic hand system comprises a new algorithm for data extraction and signal processing analysis that are measured from an object re-gripping operation based on slip detection information. …”
Get full text
Get full text
Thesis -
10
-
11
Design and development of portable real-time temperature monitoring and control system
Published 2010Get full text
Working Paper -
12
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…There has been noteworthy research on image based steganography techniques to overcome the various challenges i.e. lower embedding capacity, imperceptibility, embedding efficiency and robustness against steganalysis detection attacks. However, most of the existing embedding algorithms are incapable of overcoming the adverse effects of the challenges simultaneously. …”
Get full text
Get full text
Get full text
Thesis -
13
Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu
Published 2018“…The proposed control technique adopts 6 active voltage vectors in the discrete predictive model among 14 available active vectors based on the position of the future reference vector. …”
Get full text
Get full text
Get full text
Thesis -
14
Urban green space spatio-temporal change influences on land surface temperature in Kuala Lumpur, Malaysia
Published 2020“…The study also applied land surface emissivity (LSE) algorithm to determine the LST value extracted from the Band 10 parameter of Landsat 8 OLI/TIRS. …”
Get full text
Get full text
Thesis
