Search Results - (( java implementation 5s algorithm ) OR ( programming security normalization algorithm ))
Search alternatives:
- normalization algorithm »
- security normalization »
- programming security »
- java implementation »
- implementation 5s »
- 5s algorithm »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
-
3
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…The effectiveness of the proposed approach is demonstrated on modified IEEE 9-, 14-, and 30-bus test system models due to the limitations in the simulator program. The results indicate that the hybrid LMT accurately assesses the dynamic security status of the system under normal and fake tripping contingencies with short time frame. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
-
5
-
6
-
7
-
8
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
9
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
10
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…The OMNET++ simulation program is used to justify the proposed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. This application can be installing into the mobile phone.…”
Get full text
Get full text
Thesis -
13
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
14
An Educational Tool Aimed at Learning Metaheuristics
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
16
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
Optimal SVC allocation via symbiotic organisms search for voltage security improvement
Published 2023“…It is desirable that a power system operation is in a normal operating condition. However, the increase of load demand in a power system has forced the system to operate near to its stability limit whereby an increase in load poses a threat to the power system security. …”
Article -
20
