Search Results - (( java implementation path algorithm ) OR ( knowledge integration security algorithm ))
Search alternatives:
- knowledge integration »
- integration security »
- java implementation »
- implementation path »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Enhancement of lightweight block cipher algorithms
Published 2017“…Second, there are many researches still trying to find an algorithm that has the highest level of security. Third, there is lack knowledge on key dependent S-box within lightweight algorithms. …”
Get full text
Get full text
Book -
6
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
7
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Thus, using neural network-based semi-supervised stream data learning is inadequate due to capture the changes in the distribution and characteristics of various classes of data while avoiding the effect of the outdated stored knowledge in neural networks (NN). Therefore, we propose a prominent approach that integrates each of the NN, a meta-heuristic based on an evolutionary genetic algorithm (GA), and a core online-offline clustering (Core). …”
Get full text
Get full text
Thesis -
8
-
9
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…Once an insecure condition occurs, new actions must be considered to restore the system to secure operation. The objective of this work is to introduce new algorithms that can enhance power system security inclusive of the remedial action (generation re-dispatch/load shedding) for any scale of power system operation as well as improving the existing ANN to solve the problem faced by power system security assessment. …”
Get full text
Get full text
Thesis -
10
-
11
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
12
-
13
-
14
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…Subsequently, the security alert mechanism is formulated by integrating with the detection algorithm to alert Twitter users. …”
Get full text
Get full text
Thesis -
15
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
16
Optimal variational mode decomposition and integrated extreme learning machine for network traffic prediction
Published 2021“…However, most of the existing evolutionary algorithms have some adjustable parameters which depend on subjective experience or prior knowledge. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
19
AI recommendation penetration testing tools for password attacks: random forest
Published 2025“…Implemented using Django and SQLite, the system reduced manual efforts and specialized knowledge needed for tool selection, allowing pentesters to focus on complex security tasks. …”
Get full text
Get full text
Get full text
Article -
20
An embedding traid-bit method to improve the performance of Arabic text steganography
Published 2016“…The enormous development in the utilization of the Internet has driven by continuous improvements in the region of security. The enhanced security techniques are applied to save the intellectual property. …”
Get full text
Get full text
Get full text
Thesis
