Search Results - (( developing implementation connection algorithm ) OR ( java selection based algorithm ))
Search alternatives:
- developing implementation »
- implementation connection »
- connection algorithm »
- selection based »
- java selection »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…In the software development testing we examine image based clustering, as we can used clustering by distance base, by pixel (red, green, blue) value etc., The problem is solved by region based method which is based on connect component and background detection techniques. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Java based expert system for selection of natural fibre composite materials
Published 2013“…Computer oriented materials selection and knowledge-based expert systems are the prevailing approach in materials selection. …”
Get full text
Get full text
Get full text
Article -
3
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
4
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
5
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…But, the computer oriented materials selection and knowledge-based expert systems are the robust approach in materials selection to handle huge amount of materials of choice. …”
Get full text
Get full text
Thesis -
6
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…EACO selects the resources based on the pheromone value on each resource which is recorded in a matrix form. …”
Get full text
Get full text
Get full text
Monograph -
8
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
9
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The selected methodology for the application development is based on prototyping methodology. …”
Get full text
Get full text
Final Year Project -
10
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…The performance of Extended Virtual Force-Based Algorithm (EVFA) and Cuckoo Search (CS) algorithm are evaluated and EVFA shows the improvement of coverage area and exhibits a guaranteed connectivity compared to CS algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…EACO selects the resources based on the pheromone value on each resource which is recorded in a matrix form. …”
Get full text
Get full text
Get full text
Thesis -
13
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). …”
Get full text
Get full text
Thesis -
14
Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE
Published 2014“…A controlled Cuk DC-DC converter was implemented and connected to a SunTech STP085B PV panel to verify the accuracy of the proposed method. …”
Get full text
Article -
15
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
16
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…Next, the framework of QAPU was designed and developed. For this purpose, some gates and connections were projected in the framework which could be applied for future quantum algorithms. …”
Get full text
Get full text
Thesis -
17
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
18
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
19
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…This algorithm is very practical to implement for individuals or for small group communication but unpractical when implemented in a big company where many users can become a bottleneck. …”
Get full text
Get full text
Get full text
Article -
20
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
Get full text
Get full text
Get full text
Proceeding Paper
