Search Results - (( developing efficient computational algorithm ) OR ( java application means algorithm ))
Search alternatives:
- developing efficient »
- application means »
- java application »
- means algorithm »
-
1
Mining Sequential Patterns Using I-PrefixSpan
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…By the means of higher performance computing, the computation cannot be relying on just one single set of cluster. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
-
5
Efficient Sequential and Parallel Routing Algorithms in Optical Multistage Interconnection Network
Published 2005“…The first approach is to develop an efficient sequential algorithm for the window method. …”
Get full text
Get full text
Thesis -
6
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…An automaton-based algorithm is used to develop the filtering process proposed. …”
Get full text
Get full text
Get full text
Article -
7
Computationally efficient sequential learning algorithms for direct link resource-allocating networks
Published 2005“…Computationally efficient sequential learning algorithms are developed for direct-link resource-allocating networks (DRANs). …”
Get full text
Get full text
Article -
8
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
9
Pengesan lalu lintas dengan kaedah pemerosesan imej
Published 2001“…This study was conducted to develop efficient traffic detector using image-processing with a personal compute I: Traffic images were captured using ordinary analogue video camera and digitised using a video blastel: Four algorithms were developed i. e. algorithm for traffic counting, algorithm for vehicle classification. algorithm to determine the speed of the counted vehicles and algorithm for incident detection. …”
Get full text
Get full text
Article -
10
Energy efficiency of the bitcoin mining hardware and related blockchain technology
Published 2018Get full text
Get full text
Get full text
Undergraduates Project Papers -
11
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
12
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
Published 2015“…In order to make our proposed method cost efficient, we developed Load Aware Over Cost algorithm which is 8% cost effective comparing with Load Aware algorithm. …”
Get full text
Get full text
Thesis -
13
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…Smaller computation time means the algorithm is efficient than the other. …”
Get full text
Get full text
Conference or Workshop Item -
14
An Efficient Genetic Algorithm for Large Scale Vehicle Routing Problem Subject to Precedence Constraints
Published 2015“…Vehicle routing problem is difficult to solve using exact methods especially for large size instances due to computational expensive. Therefore, metaheuristic method based genetic algorithm has been developed to obtain feasible and optimal solution with less computation time. …”
Get full text
Get full text
Get full text
Article -
15
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. These algorithms are formulated for computing Tate and ate pairing. …”
Get full text
Get full text
Thesis -
16
Performance enhancement of AIMD algorithm for congestion avoidance and control
Published 2011“…The results have shown improvement in all aspects particularly the major ones, efficiency and fairness over the previous algorithms.…”
Get full text
Get full text
Thesis -
17
Path planning for unmanned aerial vehicles using visibility line-based methods
Published 2011“…In order to ensure that the 3D path planning algorithms are computationally efficient, the proposed 2D path planning algorithms are applied into them. …”
Get full text
Get full text
Thesis -
18
SEALiP: A simple and efficient algorithm for listing permutation via starter set method
Published 2013“…In order to demonstrate the algorithm, we are keen to list the permutations with the special references for cases of three and four objects.Based on this algorithm, a new method for listing permutations is developed and analyzed.This new permutation method will be compared with the existing lexicographic method.The results revealed that this new method is more efficient in terms of computation time.…”
Get full text
Get full text
Get full text
Article -
19
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…Adopting the medoid instead of the mean can enhance the efficiency. However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
Get full text
Get full text
Thesis -
20
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
Published 2015“…Elliptic curve cryptosystem (ECC) is being used nowadays more than ever to fulfill the need for public key cryptosystem because of its ability to use shorter keys lengths and computationally more efficient algorithms than anther public key cryptosystems such as Rivest-Shamir- Adleman (RSA), Digital Signature Algorithm (DSA) and ElGamal. …”
Get full text
Get full text
Get full text
Thesis
