Search Results - (( programming security normalization algorithm ) OR ( java application during algorithm ))
Search alternatives:
- normalization algorithm »
- security normalization »
- programming security »
- application during »
- java application »
- during algorithm »
-
1
-
2
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…The effectiveness of the proposed approach is demonstrated on modified IEEE 9-, 14-, and 30-bus test system models due to the limitations in the simulator program. The results indicate that the hybrid LMT accurately assesses the dynamic security status of the system under normal and fake tripping contingencies with short time frame. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
4
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…The OMNET++ simulation program is used to justify the proposed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
5
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
6
Optimal SVC allocation via symbiotic organisms search for voltage security improvement
Published 2023“…It is desirable that a power system operation is in a normal operating condition. However, the increase of load demand in a power system has forced the system to operate near to its stability limit whereby an increase in load poses a threat to the power system security. …”
Article -
7
-
8
-
9
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Multistage quality control in manufacturing process using blockchain with machine learning technique
Published 2023“…The proposed method efficiently provides security between innovative manufacturing transactions. …”
Get full text
Get full text
Article -
11
-
12
-
13
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
14
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
15
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
18
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
