Search Results - (( java implementation modified algorithm ) OR ( programming security optimization algorithm ))
Search alternatives:
- implementation modified »
- security optimization »
- programming security »
- java implementation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Optimizing Visual Surveillance Sensor Coverage Using Dynamic Programming
Published 2017“…To validate the proposed algorithm, we compared the outcomes of the dynamic programming algorithm with the existing benchmarking placement optimization techniques. …”
Get full text
Get full text
Article -
3
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
Get full text
Get full text
Thesis -
4
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
-
6
Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming
Published 2022“…That is, the enhanced efficiency of coverage is obtained by developing a prior grid assessment practice to stress on the security sensitive zones. Then, the dynamic programming algorithm operates on security quantified maps rather than uniform grids. …”
Get full text
Get full text
Article -
7
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
8
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…The first proposed approach is a multi-objective fuzzy linear programming optimization (MFLP) algorithm to solve the MOOPF problem. …”
Get full text
Get full text
Thesis -
9
-
10
Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad...
Published 2019“…Hence, this thesis presents a new metaheuristic optimisation technique for solving optimal FACTS devices allocation problem for voltage security control. …”
Get full text
Get full text
Thesis -
11
A hybrid MEP and AIS Algorithm for energy dispatch in power system
Published 2017“…Based on original Meta Heuristic Evolutionary Programming (Meta-EP) method with a consideration on cloning process as in Artificial Immune System (AIS) algorithm together thus identified as New Meta Heuristic Evolutionary Programming algorithm (NMEP). …”
Get full text
Get full text
Get full text
Article -
12
Designing a New Model for Worm Response Using Security Metrics
Published 2024“…In this model, the static and dynamic analyses were conducted and the machine learning algorithms were applied to optimize the performance. …”
Proceedings Paper -
13
-
14
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
15
A Hybrid Multi-objective Integrated JAYA-Evolutionary Programming (MOIJEP) Algorithm for Under Voltage Load Shedding (UVLS) Scheme in Bulk Power System
Published 2025“…MOIJEP integrates the features in the original Jaya algorithm into the conventional Evolutionary Programming (EP). …”
Conference paper -
16
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
17
A new meta heuristic evolutionary programming (NMEP) in optimizing economic energy dispatch
Published 2016“…The proposed optimization algorithm, namely New Meta-Heuristic Evolutionary Programming (NMEP) algorithm is followed to Meta-Heuristic Evolutionary Programming (Meta-EP) approach with some modification where the cloning process embedded as a significant progress during the implementation. …”
Get full text
Get full text
Get full text
Article -
18
Genetic Algorithm for Forecasting Bioinformatic Outcomes of Mutation-induced Cowpeas for Sustainable Development
Published 2023“…The study applied genetic algorithm as a stochastic optimizer using Python programming to determine the convergence pattern for obtaining an optimal cowpea solution that combines high yield and drought-tolerance. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Index-based transmission for distributed generation in voltage stability and loss control incorporating optimization technique
Published 2023“…The study emphasizes the power loss of the system in which a comparison between Evolutionary Programming (EP) and Grasshopper Optimization Algorithm is done to determine which optimization technique gives an optimal result for the DG solution. …”
Article
