Search Results - (( security classification scheduling algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- classification scheduling »
- security classification »
- application stemming »
- stemming algorithm »
- java application »
-
1
File integrity monitor scheduling based on file security level classification
Published 2011“…This paper proposes an enhancement to the scheduling algorithm of the current file integrity monitoring approach by combining the off-line and on-line monitoring approach with dynamic inspection scheduling by performing file classification technique. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean
Published 2007“…Simulation runs demonstrate that our algorithm leads to better results than the traditional algorithms for scheduling policies used in Grid environment.…”
Get full text
Article -
3
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…Boruta algorithm is used to select features automatically for assisting the machine learning. …”
Get full text
Get full text
Get full text
Article -
4
-
5
A review of controllers and optimizations based scheduling operation for battery energy storage system towards decarbonization in microgrid: Challenges and future directions
Published 2022“…Besides, this review provides a detailed discussion and classification of the various controller and optimization methods and algorithms concerning framework, executions, key findings, benefits, research gaps, along with existing issues and challenges. …”
Get full text
Get full text
Article -
6
A review of controllers and optimizations based scheduling operation for battery energy storage system towards decarbonization in microgrid: Challenges and future directions
Published 2022“…Besides, this review provides a detailed discussion and classification of the various controller and optimization methods and algorithms concerning framework, executions, key findings, benefits, research gaps, along with existing issues and challenges. …”
Get full text
Get full text
Article
