Search Results - (( basic using drops algorithm ) OR ( java implementation graph algorithm ))
Search alternatives:
- implementation graph »
- java implementation »
- graph algorithm »
- basic using »
- using drops »
-
1
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…In the benchmark paper, the result of implementation of LACE algorithm in 400, 600, 800 and 1000 servers were plotted at different graphs. …”
Get full text
Get full text
Thesis -
2
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
Get full text
Get full text
Thesis -
3
-
4
Group consumers' preference recommendation algorithm model for online apparel's colour based on Kansei engineering
Published 2023“…Thus, this study took the colour design of men's plain-colour shirts as an example in China, established the basic colour calculation scale and an algorithm model of group consumers' product preferences based on Kansei Engineering and scientific mathematics, to provide new sales ideas and methods for retailers and markets online. …”
Get full text
Get full text
Get full text
Article -
5
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…This thesis describes an analysis on the effect of these challenges on the perceived video quality over MANET which is considered the important network in many studies. An enhanced algorithm has been suggested to improve the video quality using routing algorithm which is used to transfer the data packets with minimum number of errors. …”
Get full text
Get full text
Get full text
Thesis -
6
Enhanced Handover Algorithm for Quality of Service Maintenance in an Extended Service Set Wi-Fi Network
Published 2025“…In this thesis, the study focuses on the performance of the enhanced roaming algorithm in Extended Service Set (ESS) network, which consists of multiple Basic Service Set (BSS) network. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
High Viscous Fluid Transport Model
Published 2004“…A solution algorithm was built to solve for the mathematical model. …”
Get full text
Get full text
Final Year Project -
8
Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique
Published 2022“…The study also developed an algorithm for predictive EMS using fuzzy model predictive control technique based on regression algorithm. …”
Get full text
Get full text
Thesis -
9
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
10
INVESTIGATION ON THE CUTTING PARTICLES TRANSPORT IN HORIZONTAL WELL DRILLING
Published 2010“…Accordingly, the simulations demonstrated that the basic model could be used to analyze the cuttings transport. …”
Get full text
Get full text
Thesis -
11
The enhanced fault-tolerant AODV routing protocol for Wireless Sensor Network
Published 2010“…We design and implement a backup route algorithm by creating a backup path for every node in the network. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Fractal coding of bio-metric image for face authentication
Published 2021“…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
Get full text
Get full text
Thesis -
13
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…Computer networks are becoming increasingly important to the delivery of modern society's basic services. As a result of this growing dependence, traffic and users worldwide have also grown. …”
Get full text
Get full text
Get full text
Get full text
Thesis
