Search Results - (( construct evaluation using algorithm ) OR ( java data control algorithm ))
Search alternatives:
- construct evaluation »
- evaluation using »
- using algorithm »
- data control »
- java »
-
1
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…The performance of CBH protocol is evaluated theoretically and using simulations. A discrete event simulator called GridSim and Java programming language is used to simulate the proposed protocol. …”
Get full text
Get full text
Thesis -
2
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
Get full text
Get full text
Thesis -
3
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
4
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
5
A random search based effective algorithm for pairwise test data generation
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Automated time series forecasting
Published 2011“…Moving Average, Decomposition, Exponential Smoothing, Time Series Regressions and ARIMA) were used.The algorithm was developed in JAVA using up to date forecasting process such as data partition, several error measures and rolling process.Successfully, the results of the algorithm tally with the results of SPSS and Excel.This automatic forecasting will not just benefit forecaster but also end users who do not have in depth knowledge about forecasting techniques.…”
Get full text
Get full text
Get full text
Monograph -
7
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…This common mistake has cost and time implications in construction activities. It was found that 60% of evaluations using RA might be estimated mistakenly. …”
Get full text
Get full text
Thesis -
9
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
10
Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition
Published 2010“…In the initial stage, the dynamic Bayesian network model is constructed using sets of lexical cues selected manually from the dialogue corpus. …”
Get full text
Get full text
Article -
11
-
12
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006Get full text
Get full text
Get full text
Article -
13
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
14
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
A negotiation algorithm for decision-making in the construction domain
Published 2023Conference Paper -
16
Chebyshev approximation of discrete polynomials and splines
Published 2004“…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Chebyshev approximation of discrete polynomials and splines
Published 2004“…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article -
19
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006Get full text
Get full text
Conference or Workshop Item -
20
An evolutionary based features construction methods for data summarization approach
Published 2015“…In the process of summarizing relational data, a genetic algorithm is also applied and several feature scoring measures are evaluated in order to find the best set of relevant constructed features. …”
Get full text
Get full text
Research Report
