Search Results - (( developing formative forms algorithm ) OR ( java evaluation using algorithm ))
Search alternatives:
- developing formative »
- evaluation using »
- forms algorithm »
- java evaluation »
- using algorithm »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
2
-
3
A performance analysis of association rule mining algorithms
Published 2016“…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
Get full text
Get full text
Conference or Workshop Item -
4
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
Get full text
Get full text
Thesis -
5
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
6
A Social- And Knowledge-Based Coalition Formation Using Modified Combinatorial Particle Swarm Optimization
Published 2017“…The related sub-objectives are: 1) to define coalition and social factors to form a coalition formation model, 2) to develop a knowledge representation scheme to store knowledge of formed coalitions, and 3) to develop an effective algorithm to optimize the coalition which can also be treated as a clustering problem. …”
Get full text
Get full text
Thesis -
7
Coalition formation for throughput enhancement via one-sided matching theory
Published 2016“…In the proposed model, we make use of one-sided matching theory to develop an algorithm for the cognitive radios to form coalitions of varying the size to improve their individual gains (.e.g. throughput and the probability of false alarm). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Coalition formation for throughput enhancement via one-sided matching theory
Published 2016“…In the proposed model, we make use of one-sided matching theory to develop an algorithm for the cognitive radios to form coalitions of varying the size to improve their individual gains (.e.g. throughput and the probability of false alarm). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
10
Throughput enhancement in cognitive radio network via coalition formation using matching theory
Published 2015“…In the proposed model we make use of one sided matching theory to develop an algorithm for the cognitive radios to form coalitions of varying size to improve their individual gains (.e.g. throughput and probability of false alarm). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…However, there are very few algorithms or decision engines available that could actually be used by decision-makers to aid in the process of forming a football team. …”
Get full text
Get full text
Get full text
Thesis -
12
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
13
Development of a mathematical model for the prediction of chip formation instability and its verification by fuzzy logic with genetic algorithm
Published 2010“…Mechanism of formation of these teeth has been studied and the frequency of their formation has been determined. …”
Get full text
Get full text
Get full text
Article -
14
Identification of Freeform Depression Feature in a Part Using Vertex Attributes From Feature Volume / Pramod S Kataraki and Mohd Salman Abu Mansor
Published 2018“…In this paper an effort is made to develop an algorithm that can recognize freeform depression feature of a part of any form by using vertex attributes of feature volume. …”
Get full text
Get full text
Article -
15
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
16
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
18
Development of a hydrate formation prediction model for sub-sea pipeline
Published 2017“…In this research work, a novel model is developed to the hydrate formation pressure and hydrate formation temperature for a single component of methane (CH4) gas. …”
Get full text
Get full text
Article -
19
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…To help engineers select the best metaheuristic algorithms for their problems, there is a need to evaluate the performance of different metaheuristic algorithms against each other using common case studies. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
