Search Results - (( data simulation based algorithm ) OR ( java application model algorithm ))
Search alternatives:
- application model »
- simulation based »
- java application »
- data simulation »
- model algorithm »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
2
Automated time series forecasting
Published 2011“…Good planning and controlling procedure would lead to successful business.There are two categories of forecasting techniques; namely qualitative and quantitative.Qualitative technique is more towards judgmental forecasting and usually used when data is limited. While quantitative technique is based on statistical concepts and requires large amount of data in order to formulate the mathematical models.This technique can be classified into projective and causal technique.The projective technique (or univariate modelling) just involve one variable while the causal technique (or econometric modelling) suitable for multi-variables.Since forecasting involves uncertainty, several methods need to be executed on one set of time series data in order to produce accurate forecast.Hence, usually in practice forecaster need to use several softwares to obtain the forecast values.If this practice can be transformed into algorithm (well-defined rules for solving a problem) and then the algorithm can be transformed into a computer program, less time will be needed to compute the forecast values where in business world time is money.In this study, we focused on algorithm development for univariate forecasting techniques only and will expand towards econometric modelling in the future.Two set of simulated data (yearly and non-yearly) and several univariate forecasting techniques (i.e. …”
Get full text
Get full text
Get full text
Monograph -
3
-
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
6
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
8
-
9
PSAT : a pairwise test data generation tool based on simulated annealing algorithm
Published 2015“…This research is about the research on developing a Pairwise Test Data Generation Tool based on Simulated Annealing (SA) algorithm which named as PSAT. …”
Get full text
Get full text
Undergraduates Project Papers -
10
-
11
Optimized clustering with modified K-means algorithm
Published 2021“…Empirical evidences based on simulated data sets indicated that the proposed modified k-means algorithm is able to recognise the optimum number of clusters for uncorrelated data sets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
13
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…In order to verify the advantages of the proposed algorithm, it is compared with simulation results without contextual aware algorithm. …”
text::Thesis -
14
An exponential based simulated kalman filter algorithm for data-driven PID tuning in liquid slosh controller
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
16
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
17
Ant colony optimization for rule induction with simulated annealing for terms selection
Published 2012“…This paper proposes a sequential covering based algorithm that uses an ant colony optimization algorithm to directly extract classification rules from the data set.The proposed algorithm uses a Simulated Annealing algorithm to optimize terms selection, while growing a rule.The proposed algorithm minimizes the problem of a low quality discovered rule by an ant in a colony, where the rule discovered by an ant is not the best quality rule, by optimizing the terms selection in rule construction. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current sequential algorithm. …”
Get full text
Get full text
Thesis -
19
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…Conventionally, the numerical simulations for such devices are obtained by using the commercial simulation packages based on the Finite Element Methods (FEM). …”
Get full text
Get full text
Thesis -
20
Encryption selection for WLAN IEEE802.11G
Published 2013“…There were two scenarios that have been tested in the simulation. In the first scenario, the data was tested with encryption protocols and for the second scenario, the data was tested with encryption algorithms and also encryption protocols. …”
Get full text
Get full text
Thesis
