Search Results - (( basic time computational algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- time computational »
- implication based »
- java implication »
- basic time »
-
1
Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman
Published 2020“…On a smaller game map, the algorithm still takes an acceptable computing time but on a larger size map, the computation time suffers a lot. …”
Get full text
Get full text
Thesis -
2
Voting algorithms for large scale fault-tolerant systems
Published 2011“…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
Get full text
Get full text
Thesis -
3
-
4
Ant system with heuristics for capacitated vehicle routing problem
Published 2013“…As a result, the ASH algorithm is a viable alternative for addressing the CVRP with satisfactory solution quality and run time.…”
Get full text
Get full text
Thesis -
5
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The semantic similarity measure algorithm is used to compute the similitude strength between the Gene Ontology terms. …”
Get full text
Get full text
Get full text
Article -
6
Developing class scheduler system / Mohamed Imran Mohamed Ariff
Published 2006Get full text
Get full text
Research Reports -
7
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Class timetabling problem is one of the applications in scheduling. Basically, it will look into matters such as putting students into certain time slot. …”
Get full text
Get full text
Thesis -
8
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…One basic Ballistic Missile model (10) is used as an unstable model to formulate the control law algorithm using PFC. …”
Get full text
Get full text
Conference or Workshop Item -
9
Accelerating graph algorithms with priority queue processor
Published 2006“…Many graph algorithms are organized as simple elaborations of basic graph searching algorithms. …”
Get full text
Get full text
Article -
10
Communication and computational cost on parallel algorithm of PDE elliptic type
Published 2009Get full text
Get full text
Book Section -
11
Comparative study on job scheduling using priority rule and machine learning
Published 2021“…VM is allocated in space-sharing mode all the time. We’ve achieved better for SJF and a decent machine learning algorithm outcome as well.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Motion estimation in video compression process is computationally intensive for video encoder that involve a large percentage of processing time. …”
Get full text
Get full text
Thesis -
13
-
14
Adaptive mechanism for enhanced performance of shark smell optimization / Nur Atharah Kamarzaman, Shahril Irwan Sulaiman and Intan Rahayu Ibrahim
Published 2021“…Determination of high performance and lower computing time with simple algorithm is therefore continuously established. …”
Get full text
Get full text
Get full text
Article -
15
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…However, because of the SVD computational complexity that involved in the algorithm, the classical SMI algorithms are not suitable for online application. …”
Get full text
Get full text
Get full text
Article -
16
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Both of these algorithms are designed using 16 × 16 block size. In particular, the motion vector estimation, quality performance, computational complexity, and elapsed processing time are emphasised. …”
Get full text
Get full text
Get full text
Book Chapter -
17
-
18
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
19
A dataglove hardware design and real-time sign gesture interpretation.
Published 2023Conference Paper -
20
Human emotion recognition for computer games player using AdaBoost algorithm / Muhamad Nur Adhwa Muhamad Shukri
Published 2017“…The application has been developed in Python as an in-game application that automatically recognize six basic human emotions, which are anger, disgust, happiness, surprise, fear, and sadness in real time video within a computer game and show the percentage of the emotions at end of the computer game session. …”
Get full text
Get full text
Thesis
