Search Results - (( java implementation models algorithm ) OR ( programming security optimization algorithm ))
Search alternatives:
- implementation models »
- security optimization »
- programming security »
- java implementation »
- models algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
2
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Optimizing Visual Surveillance Sensor Coverage Using Dynamic Programming
Published 2017“…To validate the proposed algorithm, we compared the outcomes of the dynamic programming algorithm with the existing benchmarking placement optimization techniques. …”
Get full text
Get full text
Article -
5
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
Get full text
Get full text
Thesis -
6
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming
Published 2022“…That is, the enhanced efficiency of coverage is obtained by developing a prior grid assessment practice to stress on the security sensitive zones. Then, the dynamic programming algorithm operates on security quantified maps rather than uniform grids. …”
Get full text
Get full text
Article -
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
10
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…The first proposed approach is a multi-objective fuzzy linear programming optimization (MFLP) algorithm to solve the MOOPF problem. …”
Get full text
Get full text
Thesis -
11
-
12
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
13
Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad...
Published 2019“…Hence, this thesis presents a new metaheuristic optimisation technique for solving optimal FACTS devices allocation problem for voltage security control. …”
Get full text
Get full text
Thesis -
14
-
15
A hybrid MEP and AIS Algorithm for energy dispatch in power system
Published 2017“…Based on original Meta Heuristic Evolutionary Programming (Meta-EP) method with a consideration on cloning process as in Artificial Immune System (AIS) algorithm together thus identified as New Meta Heuristic Evolutionary Programming algorithm (NMEP). …”
Get full text
Get full text
Get full text
Article -
16
Designing a New Model for Worm Response Using Security Metrics
Published 2024“…In this model, the static and dynamic analyses were conducted and the machine learning algorithms were applied to optimize the performance. …”
Proceedings Paper -
17
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
20
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper
