Search Results - (( java implementation modified algorithm ) OR ( parameter solution matching algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- parameter solution »
- matching »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Combining Recursive Least Square and Principal Component Analysis for Assisted History Matching
Published 2014“…History matching is a process of altering parameters in a reservoir simulator in order to match production performance with observed historical data. …”
Get full text
Get full text
Final Year Project -
3
Artificial neural network and inverse solution method for assisted history matching of a reservoir model
Published 2017“…A typical inverse problem encountered in petroleum industries is referred to as history matching. In the early days, history matching was undertaken by manually changing sensitive reservoir parameters until a reasonable match between observed and simulated pressure and production data are obtained. …”
Get full text
Get full text
Article -
4
An Improved Hybrid of Particle Swarm Optimization and the Gravitational Search Algorithm to Produce a Kinetic Parameter Estimation of Aspartate Biochemical Pathways
Published 2017“…Although the model itself can potentially match a set of experimental data, a high-performance estimation algorithm is required to improve the quality of the solutions. …”
Get full text
Get full text
Get full text
Article -
5
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
6
-
7
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
8
-
9
Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery
Published 2017“…Results were compared with well-known algorithms; including, for example, global and local stereo matching algorithms. …”
Get full text
Get full text
Article -
10
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
11
Development of Graphical User Interface (GUI) for Antenna Design
Published 2016“…This project involves four main phases, which is the theoretical modeling of antenna, critical review design of antenna, implementation of synthesis algorithm of antenna and the GUI development. The methodology of this project involved the selection of antenna types to design, computation of antenna parameters, analysis of antenna performance and lastly end with the impedance matching solution. …”
Get full text
Get full text
Final Year Project -
12
-
13
The effect of key parameters on the design of an optimized CAES power plant
Published 2017“…Among all, Compressed air energy storage (CAES) technology has proposed itself as a reliable and efficient solution to match the two sides. This paper deals with a modeled compressed air energy storage power plant which has been optimized thermodynamically through an efficient genetic algorithm code. …”
Get full text
Get full text
Article -
14
An advanced scheme based on Artificial Intelligence technique for solving nonlinear Riccati systems
Published 2024“…Numerical results demonstrate that the proposed method not only closely matches the exact solutions and reference solutions but also is more accurate than other existing methods. © The Author(s) under exclusive licence to Sociedade Brasileira de Matemática Aplicada e Computacional 2024.…”
Get full text
Get full text
Article -
15
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
16
Deep learning model for predicting and detecting overlapping symptoms of cardiovascular diseases in hospitals of UAE
Published 2012“…Hence, the best clinical applications of DL require considerate problem solving solution, selection of the most suitable DL algorithms and information, and defining balance of outcome. …”
Get full text
Get full text
Get full text
Article -
17
Model of Bayesian tangent eye shape for eye capture
Published 2014“…Owing to maximum a posteriori estimation, we can identify similarity transform coefficients as well as the eye shape parameters in BTESM. To apply the maximum a posteriori procedure, tangent Eye shape vector was considered the state of the model which is hidden and expectation maximization depending on searching algorithm was adopted. …”
Get full text
Get full text
Conference or Workshop Item -
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
19
Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots
Published 2018“…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
LINGUISTIC FUZZY MODELING IN LASER MACHINING QUALITY EVALUATION
Published 2007“…The finding shows that, the developed lingual fuzzy model has produced a sound output as it matches closely and agrees well to the experimental result.…”
Get full text
Get full text
Conference or Workshop Item
