Search Results - (( evolution optimization interface algorithm ) OR ( java applications modified algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1
  2. 2

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    An improved hybrid method combined with a cloud-based supervisory control to facilitate smooth coordination under low-inertia grids by Yiizzan, Suffian, Ahmed Mohamed, Ahmed Haidar, Wan Azlan, Wan Zainal Abidin, Hazrul, Mohamed Basri

    Published 2025
    “…The framework has been validated on interconnected Simulink models running in a real-time cloud platform with data collected from local systems, interfaced in a closed-loop test environment. The proposed algorithm demonstrates outstanding performance in maintaining system stability under various operating conditions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7