Search Results - (( java simulation optimization algorithm ) OR ( security estimation using algorithm ))
Search alternatives:
- security estimation »
- java simulation »
- using algorithm »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
2
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
3
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
5
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…The extended MILP technique is able to provide an automatic security estimation tool by giving accurate results. …”
Get full text
Get full text
Get full text
Article -
6
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Redundancy allocation for a high security control system using estimation of distribution algorithm
Published 2012Get full text
Working Paper -
9
Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff
Published 2024“…In this project, we want to create an age identification system that uses Convolutional Neural Network (CNN) algorithms to estimate people's ages fast and accurately from facial images. …”
Get full text
Get full text
Thesis -
10
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
11
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
12
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
13
ADAPTIVE LINEAR ALGORITHMS FOR POWER SYSTEM FUNDAMENTAL AND HARMONIC ESTIMATION
Published 2015“…Hence, one of the objectives of this thesis is to address and enhance the introduced fundamental frequency adaptive filter method which was based on modified variable step size LMS (MVSS) algorithm using generalized square error normalized LMS algorithm. …”
Get full text
Get full text
Thesis -
14
Age Group Estimation from Face Images
Published 2015“…Age group estimation is useful in real-world applications such as security access control and human computer interaction. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
Published 2005“…This transformation function improves the security of the AES algorithm by increasing the randomness of the AES output sequence. …”
Get full text
Get full text
Thesis -
17
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…From the result of the analysis, it has been justified that the proposed DDBC algorithm can be considered as one of the secure symmetric block cipher and can be used as an alternative to other cryptographic algorithm in computer security research area.…”
Get full text
Get full text
Thesis -
18
Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach with Curated Dataset Generation for Enhanced Security
Published 2023“…To overcome these issues in this algorithm, we have improved the existing DBSCAN to ST-DBSCAN where we have used the estimation for the epsilon value and used the Manatton distance formula to find out the distance between points which produces 94.9853 accuracy on our dataset. …”
Get full text
Get full text
Article -
19
DESIGN AND DEVELOPMENT OF KEY REPRESENTATION AUDITING SCHEME FOR SECURE ONLINE AND DYNAMIC STATISTICAL DATABASES
Published 2010“…Three audit stages are proposed to repel the attacks of the snooper to the confidentiality of the individuals. Also, efficient algorithms for these stages are presented, namely the First Stage Algorithm (FSA), the Second Stage Algorithm (SSA) and the Third Stage Algorithm (TSA). …”
Get full text
Get full text
Thesis -
20
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…This algorithm is used to estimate the maximum loadability point in power system. …”
Get full text
Get full text
Thesis
