Search Results - (( developing execution model algorithm ) OR ( java application need algorithm ))
Search alternatives:
- developing execution »
- java application »
- application need »
- execution model »
- model algorithm »
- need algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The focus of this study is to propose an enhancement on memory consumption by reducing the number of candidates generated for the existing FLEX algorithm which will reduce the amount of memory needed to execute the algorithm. …”
Get full text
Get full text
Thesis -
2
Automated time series forecasting
Published 2011“…While quantitative technique is based on statistical concepts and requires large amount of data in order to formulate the mathematical models.This technique can be classified into projective and causal technique.The projective technique (or univariate modelling) just involve one variable while the causal technique (or econometric modelling) suitable for multi-variables.Since forecasting involves uncertainty, several methods need to be executed on one set of time series data in order to produce accurate forecast.Hence, usually in practice forecaster need to use several softwares to obtain the forecast values.If this practice can be transformed into algorithm (well-defined rules for solving a problem) and then the algorithm can be transformed into a computer program, less time will be needed to compute the forecast values where in business world time is money.In this study, we focused on algorithm development for univariate forecasting techniques only and will expand towards econometric modelling in the future.Two set of simulated data (yearly and non-yearly) and several univariate forecasting techniques (i.e. …”
Get full text
Get full text
Get full text
Monograph -
3
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
4
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Load-Balancing Models for Scheduling Divisible Load on Large Scale Data Grids
Published 2009“…In addition, the integration of the proposed DLT model with Simulated Annealing (SA) algorithm has been also developed. …”
Get full text
Get full text
Thesis -
6
Modelling of multi-robot system for search and rescue
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
A discrete event simulation framework for utility accrual scheduling algorithm in uniprocessor environment
Published 2011“…GUS is one of the existing TUF/UA scheduling algorithms that consider the Time/Utility Function (TUF) of the executed tasks in its scheduling decision. …”
Get full text
Get full text
Get full text
Article -
9
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
10
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
11
Optimisation model for scheduling MapReduce jobs in big data processing / Ibrahim Abaker Targio Hashem
Published 2017“…The proposed algorithm is evaluated using tasks scheduling in the scheduling load simulator and validated using statistical modeling. …”
Get full text
Get full text
Get full text
Thesis -
12
Development of decentralized data fusion algorithm with optimized kalman filter.
Published 2016“…This thesis proposes a data fusion model that facilitates selection of algorithm and recommends selected algorithm to be optimized. …”
Get full text
Get full text
Thesis -
13
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…Thus, the LDPC code encoder model is developed to identify a low complexity encoding algorithm of LDPC code for the DF protocol relay system. …”
Get full text
Get full text
Get full text
Thesis -
14
Software for modelling the static and dynamic flux linkage - current characteristics of A 6/4 SRM
Published 1996“…Program in C language was developed to validate the algorithm provided by Torrey [5,7].…”
Get full text
Get full text
Student Project -
15
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
16
Some metaheuristic algorithms for solving multiple cross-functional team selection problems
Published 2022“…We compared the developed algorithms with the MIQP-CPLEX solver on 500 programming contestants with 37 skills and several randomized distribution datasets. …”
Get full text
Get full text
Article -
17
Development of task distribution algorithm for multi-robot coordination system
Published 2022“…During the development process, the simulation environment is modeled with desired task points, robots, and traffic lanes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
19
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
20
A discrete event simulation for utility accrual scheduling in uniprocessor environment
Published 2011“…GUS is one of the existing TUF/UA scheduling algorithms that consider the Time/Utility Function (TUF) of the executed tasks in its scheduling decision in a uniprocessor environment. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
