Search Results - (( based computing based algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The proliferation of high speed wireless technologies and mobile computing infrastructures has fostered a rapid development in location based services. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A priority based job scheduling algorithm in cloud computing by Shamsollah, Ghanbari, Othman, Mohamed

    Published 2012
    “…Some intensive researches have been done in the area of job scheduling of cloud computing. In this paper we have proposed a new priority based job scheduling algorithm (PJSC) in cloud computing. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data by Khan, Rahim, Ali, Ihsan, Altowaijri, Saleh, Zakarya, Muhammad, Rahman, Atiq Ur, Ahmedy, Ismail, Khan, Anwar, Gani, Abdullah

    Published 2019
    “…Several non-metric-based algorithms are available in the literature, the most robust and reliable one is the dynamic programming-based technique. …”
    Get full text
    Get full text
    Article
  8. 8

    Fuzzy C-Mean And Genetic Algorithms Based Scheduling For Independent Jobs In Computational Grid by Lorpunmanee, Siriluck, Md Sap, Mohd Noor, Abdullah, Abdul Hanan

    Published 2006
    “…Our model presents the method of the jobs classifications based mainly on Fuzzy C-Mean algorithm and mapping the jobs to the appropriate resources based mainly on Genetic algorithm. …”
    Get full text
    Get full text
    Article
  9. 9

    Optimizing BOINC scheduling using genetic algorithm based on thermal profile by Binti, N.N., Zakaria, M.N.B., Aziz, I.B.A., Binti, N.S.

    Published 2014
    “…In order to fully utilize the computer in labs, we proposed new jobs scheduling algorithm can run based on thermal constraInternational The proposed algorithm is combination of thermal profile and heuristic approach. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…It is based on Addition Chain. The computation time for existing and new algorithms will be recorded. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…There are several block-matching algorithm based on block-based motion estimation techniques have been developed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  12. 12
  13. 13
  14. 14

    A Genetic Algorithm Based Approach for Solving the Minimum Dominating Set of Queens Problem by Alharbi, Saad, Venkat, Ibrahim

    Published 2017
    “…However, literature shows that limited research has been carried out to solve theMDSQP using bioinspired algorithms. To fill this gap, this paper proposes a simple and effective solution based on genetic algorithms to solve this classical problem. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A Genetic Algorithm Based Approach for Solving the Minimum Dominating Set of Queens Problem by Alharbi, Saad, Venkat, Ibrahim

    Published 2017
    “…However, literature shows that limited research has been carried out to solve theMDSQP using bioinspired algorithms. To fill this gap, this paper proposes a simple and effective solution based on genetic algorithms to solve this classical problem. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Algorithm for resource allocation and computing offloading in 6G networks: deep reinforcement learning-based by Saeed, Mamoon M, Saeed, Rashid A, Ali, Elmustafa Sayed, Mokhtar, Rania A, Khalifa, Othman Omran

    Published 2024
    “…The Deep Reinforcement Learning-based DCORA algorithm for computation offloading and resource allocation is effective, as demonstrated by our simulations. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18

    The development of deformable bodies collision response algorithm for interactive virtual environment by Mohd. Shuaib, Norhaida, Bade, Abdullah, Daman, Daut, Sunar, Mohd. Shahrizal

    Published 2006
    “…Assuming no external forces other than concentrated loads, the optimization algorithm succeeded to reduce deformation computation for physical based deformation systems. …”
    Get full text
    Get full text
    Monograph
  19. 19

    On the Computational Cost of Cocks’ Identity Based Encryption by Moo, Gabriel Ka Lin, Arif Mandangan, Rozaimi Zakaria

    Published 2018
    “…Therefore, the aim of this paper is to investigate which algorithm in Cocks’ Identity Based Encryption consumes high computational cost and subsequently contributes to its inefficiency. …”
    Get full text
    Get full text
    Article
  20. 20

    Latin hypercube sampling Jaya algorithm based strategy for T-way test suite generation by Nasser, Abdullah B., Abdul-Qawy, Antar S. H., Abdullah, Nibras, Hujainah, Fadhl, Kamal Z., Zamli, Ghanem, Waheed A. H. M.

    Published 2020
    “…Many t-way testing strategies appear in the literature to-date ranging from general computational ones to meta-heuristic based. Owing to its performance, man the meta-heuristic based t-way strategies have gained significant attention recently (e.g. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item