Search Results - (( java implementation from algorithm ) OR ( programming security optimization algorithm ))
Search alternatives:
- security optimization »
- programming security »
- java implementation »
- implementation from »
- from algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
-
3
Optimizing Visual Surveillance Sensor Coverage Using Dynamic Programming
Published 2017“…To validate the proposed algorithm, we compared the outcomes of the dynamic programming algorithm with the existing benchmarking placement optimization techniques. …”
Get full text
Get full text
Article -
4
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
Get full text
Get full text
Thesis -
5
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
6
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming
Published 2022“…That is, the enhanced efficiency of coverage is obtained by developing a prior grid assessment practice to stress on the security sensitive zones. Then, the dynamic programming algorithm operates on security quantified maps rather than uniform grids. …”
Get full text
Get full text
Article -
9
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…The first proposed approach is a multi-objective fuzzy linear programming optimization (MFLP) algorithm to solve the MOOPF problem. …”
Get full text
Get full text
Thesis -
10
-
11
Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad...
Published 2019“…Hence, this thesis presents a new metaheuristic optimisation technique for solving optimal FACTS devices allocation problem for voltage security control. …”
Get full text
Get full text
Thesis -
12
A hybrid MEP and AIS Algorithm for energy dispatch in power system
Published 2017“…Based on original Meta Heuristic Evolutionary Programming (Meta-EP) method with a consideration on cloning process as in Artificial Immune System (AIS) algorithm together thus identified as New Meta Heuristic Evolutionary Programming algorithm (NMEP). …”
Get full text
Get full text
Get full text
Article -
13
Designing a New Model for Worm Response Using Security Metrics
Published 2024“…In this model, the static and dynamic analyses were conducted and the machine learning algorithms were applied to optimize the performance. …”
Proceedings Paper -
14
-
15
A Hybrid Multi-objective Integrated JAYA-Evolutionary Programming (MOIJEP) Algorithm for Under Voltage Load Shedding (UVLS) Scheme in Bulk Power System
Published 2025“…MOIJEP integrates the features in the original Jaya algorithm into the conventional Evolutionary Programming (EP). …”
Conference paper -
16
A new meta heuristic evolutionary programming (NMEP) in optimizing economic energy dispatch
Published 2016“…The proposed optimization algorithm, namely New Meta-Heuristic Evolutionary Programming (NMEP) algorithm is followed to Meta-Heuristic Evolutionary Programming (Meta-EP) approach with some modification where the cloning process embedded as a significant progress during the implementation. …”
Get full text
Get full text
Get full text
Article -
17
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
18
Genetic Algorithm for Forecasting Bioinformatic Outcomes of Mutation-induced Cowpeas for Sustainable Development
Published 2023“…The study applied genetic algorithm as a stochastic optimizer using Python programming to determine the convergence pattern for obtaining an optimal cowpea solution that combines high yield and drought-tolerance. …”
Get full text
Get full text
Get full text
Article -
19
Route Optimization System
Published 2005“…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
Get full text
Get full text
Final Year Project -
20
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article
