Search Results - (( developing effective utilizing algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- effective utilizing »
- validation using »
- java validation »
- using algorithm »
-
1
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
2
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
3
Improving utility accrual scheduling algorithm for adaptive real-time system
Published 2008“…Both of these algorithms are developed for adaptive real-time system environment where untoward effects such as deadline misses and overloads are tolerable. …”
Get full text
Get full text
Conference or Workshop Item -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
5
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2009“…And also all the developments for the congestion control and avoidance algorithms interest about the using of network resources and use the links capacity (utilization). …”
Get full text
Get full text
Article -
7
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
8
On the delay and link utilization with the new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2010“…We want to evaluate the effect of using the AIMD algorithm after developing it, which we called the New-AIMD algorithm, to find a new approach to measure the end-to-end delay and bottleneck link utilization and use the NCTUns simulator to obtain the results after making the modification for the mechanism. …”
Get full text
Get full text
Get full text
Article -
9
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
10
Multi-objective optimization of stand-alone hybrid renewable energy system by genetic algorithm
Published 2013“…Multi-objective optimization of HRES by Evolutionary Algorithm have become attractive in recent years due to the effectiveness of such algorithms for complicated problems. …”
Get full text
Get full text
Thesis -
11
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
12
Energy Management in Integrated Microgrids: An Optimal Schedule Controller Utilizing Gradient Descent Algorithm
Published 2024“…The developed BGD algorithm's effectiveness is further validated through a comparative analysis with conventional methods…”
Conference Paper -
13
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…This research tries to utilize biological-inspired computing algorithm, Immune Network algorithm, in this sentiment analysis field. …”
Get full text
Get full text
Thesis -
14
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…Moreover, the system must satisfy non-functional requirements like reliability, efficiency, performance, effective resource utilization, and scalability. Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
Get full text
Get full text
Thesis -
15
Towards the utilization of normalized LMS algorithm in adaptive filter
Published 2014“…In this paper, we focused on how the development of algorithms helped reduce the level of noise. …”
Get full text
Get full text
Get full text
Article -
16
Development of task distribution algorithm for multi-robot coordination system
Published 2022“…The problem always arises when robots are navigating such as the collision between robots and obstacles. Hence, an effective task distribution algorithm is important to allocate tasks correctly among the robots with optimum cost and time utilization. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Optimization Of Dynamic Transportation Task Assignment In A Manufacturing Facility
Published 2020“…A pattern toward multi-objectives approaches, developing facility layout software utilizing meta-heuristics, for example, simulated annealing (SA), genetic algorithm (GA), Anylogic Software and concurrent engineering to facility layout is observed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Enhanced location and positioning in wimax networks with virtual mimo base station
Published 2015“…The developed algorithm includes the effect of the geometric dilution of precision (GDOP) to assist with the location estimation accuracy. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Utility-based non-cooperative power control game in wireless environment / Yousef Ali Mohammed Al-Gumaei
Published 2017“…Numerical simulations are used to prove the effectiveness of these algorithms compared with other existing power control algorithms. …”
Get full text
Get full text
Get full text
Thesis -
20
Steganography based on utilizing more surrounding pixels
Published 2010“…The effect of considering the rest of surrounding pixels on the performance of the developed model is studied and the effectiveness and shortcomings are highlighted. …”
Get full text
Get full text
Thesis
