Search Results - (( java application optimisation algorithm ) OR ( basic negative selection algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- selection algorithm »
- negative selection »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
3
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
4
Application of bioinformatics to Helicobacter pylori vaccinology / Nurah Zainal Abidin
Published 2008“…To yield a vaccine that has high selectivity against Helicobacter pylori, specific target of antigenic sequence need to be selected. …”
Get full text
Get full text
Thesis -
5
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…In order to achieve this, different sets of trust information including QoS, OSNs and ant colony system (ACS) algorithm are proposed to improve the selection of trustworthy node. …”
Get full text
Get full text
Get full text
Thesis
