Search Results - (( based instruction usage algorithm ) OR ( java adaptation optimization algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1
  2. 2

    Cache replacement algorithm using hierarchical allocation scheduling by Mohd Sharif, Mohammad Faizal

    Published 2014
    “…HAS is to schedule the instructions based on the priority of instructions from the aspect of space and time. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Cloud computing load balancing technique with virtual machine migration / Rabiatul Addawiyah Mat Razali by Mat Razali, Rabiatul Addawiyah

    Published 2017
    “…Besides that, the performance of this technique is analyzed by using a Cloudsim simulator. Based on the analysis, positive results of the proposed algorithm are demonstrated, which shows the load balancing process is shown to have improved based on the distribution of virtual machines onto matching-type of resources, while a more efficient migration of virtual machines can be seen based on the defined CPU usage thresholds. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device by Shanmuga, Pillai A/L Murutha Muthu

    Published 2021
    “…In order to make BCI useful, one of the approaches is to classify the EEG time series signal that may indicate given eye movements that will be used as input instructions to a device. This research will investigate the application of the Symbolic Aggregate Approximation (SAX) algorithm on top of known supervised machine learning techniques to perform EEG signal classification. …”
    Get full text
    Thesis
  5. 5

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…We analyse the solution and compare with a range of well-known algorithms in terms of compression ratio, memory usage, the number of instructions, compression speed and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework by Wan Nor Ashiqin Wan Ali, Wan Ahmad Jaafar Wan Yahaya

    Published 2022
    “…They are part of a tech-savvy generation that led to technological progress that is always connected and linked based on their wishes and needs without any hesitation of time and place. …”
    Get full text
    Get full text
    Get full text
    Article