Search Results - (( java implementation modified algorithm ) OR ( computing services learning algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- learning algorithm »
- services learning »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
-
4
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024Subjects:Article -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
-
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
8
The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed
Published 2024Conference Paper -
9
Phishing attack detection using machine learning method
Published 2019“…This is because some of the computer users do not install security system in their computer. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
10
-
11
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
12
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
13
Architecture for latency reduction in healthcare internet-of-things using reinforcement learning and fuzzy based fog computing
Published 2019“…This hybrid approach integrates healthcare IoT devices with the cloud and uses fog services with Fuzzy Reinforcement Learning Data Packet Allocation (FRLDPA) algorithm. …”
Get full text
Get full text
Article -
14
Architecture for latency reduction in healthcare internet-of-things using reinforcement learning and fuzzy based fog computing
Published 2019“…This hybrid approach integrates healthcare IoT devices with the cloud and uses fog services with Fuzzy Reinforcement Learning Data Packet Allocation (FRLDPA) algorithm. …”
Get full text
Get full text
Article -
15
Fog-cloud scheduling simulator for reinforcement learning algorithms
Published 2023“…Therefore, supplying optimized scheduling algorithms to provide satisfactory quality service for the node’s task execution and processing becomes demanding. …”
Get full text
Get full text
Article -
16
-
17
Evaluation of boruta algorithm in DDoS detection
Published 2023“…Distributed Denial of Service (DDoS) is a type of attack that leverages many compromised systems or computers, as well as multiple Internet connections, to flood targeted resources simultaneously. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Grid portal technology for web based education of parallel computing courses, applications and researches
Published 2009“…This paper proposes the web service education technology for postgraduate parallel computing course, e-learning students, real-time solutions and for supervising projects related to the application of parallel computing, that focuses on the fundamental principles to parallel computer architecture, multimedia, communication cost, master-worker model, parallel algorithm, web services and performance evaluations. …”
Get full text
Get full text
Conference or Workshop Item -
20
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
Get full text
Get full text
Thesis
