Search Results - (( java application modified algorithm ) OR ( mode selection path algorithm ))
Search alternatives:
- application modified »
- java application »
- mode selection »
- selection path »
- path algorithm »
-
1
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…Attack paths that satisfy certain optimization criteria are then selected and presented as possible components of the security solution. …”
Get full text
Get full text
Article -
2
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…Attack paths that satisfy certain optimization criteria are then selected and presented as possible components of the security solution. …”
Get full text
Get full text
Article -
3
A Mininet emulation study for SDN fat tree data center sleep mode routing algorithms
Published 2025“…In this work meta heuristic algorithm is incorporated at the SDN central controller in a fat tree-based data centre for bandwidth usage monitoring, sleep decisions and path selection using Mininet emulation. …”
Article -
4
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
5
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The system is then used in path prediction mode for reconstructing the missing parts of the trajectory when actual positioning data is unavailable. …”
Get full text
Get full text
Thesis -
6
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2017“…MicroNIR was set up in two different scan modes to study the effect of path length to the performance of spectral measurement. …”
Get full text
Get full text
Get full text
Article -
7
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2024“…MicroNIR was set up in two different scan modes to study the effect of path length to the performance of spectral measurement. …”
Article -
8
An Energy-Efficient Cross-Layer approach for cloud wireless green communications
Published 2017“…More precisely, network layer could utilize the MAC layer and physical layer information to establish an energy efficient route path to be used in forwarding data. The proposed EECL approach uses X-MAC protocol in support of duty cycle which introduces short preambles that switches to wake-up/sensing mode only for nodes belonging to routing path while the other nodes set to be in sleep mode. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Levy slime mould algorithm for solving numerical and engineering optimization problems
Published 2022“…The SMA is a newly developed metaheuristic algorithm that is inspired by the slime moulds natural oscillation mode. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
11
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
12
LED based NIR spectroscopy for detection of lard adulteration in palm oil via chemometrics / Katrul Nadia Basri
Published 2017“…MicroNIR was set up in two different scan modes to study the effect of path length to the performance of spectral measurement. …”
Get full text
Get full text
Thesis -
13
GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks
Published 2014“…The Greedy Forwarding Strategy (GFS) has been the most used strategy in position-based routing protocols. The GFS algorithm was designed as a high-performance protocol that adopts hop count in soliciting shortest path. …”
Get full text
Get full text
Get full text
Thesis -
14
Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks
Published 2022“…Also, implementing all GCLs in the selected path based on TT evaluations without considering their impacts on the AVB performance results in improper scheduling designs. …”
Get full text
Get full text
Thesis -
15
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
16
-
17
Load balancing and congestion control in ATM using fuzzy logic and spiking neuron network / Tan Jiann Shin
Published 2005“…The proposed intelligent routing algorithm, integrates spiking neuron network with fuzzy link cost for the dynamic routing computation. …”
Get full text
Get full text
Thesis
