Search Results - (( developing reading optimization algorithm ) OR ( java data function algorithm ))
Search alternatives:
- reading optimization »
- function algorithm »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
The optimization of resources allocation to minimize energy consumption within data center in cloud
Published 2019“…The advantages of these services are extremely significant, but the data centers that offer this kind of service are suffering from over power consumption that impose serious threats to the environment due to the emission of carbon dioxide to the atmosphere.Because of some disadvantages in Dynamic Voltage Frequency Scheduling (DVFS), this paper proposes a cloud scheduling algorithm adapted from Dynamic Resource Allocation Method (DRA) to be developed with the goal of dynamically virtual machines (VMs) migration when resource utilization reaches above or below threshold readings in order to optimize the power consumption towards energy saving in cloud data center. …”
Get full text
Get full text
Get full text
Article -
3
Hybridized firefly algorithm for multi-objective radio frequency identification (RFID) network planning
Published 2017“…A novel approach of hybrid firefly algorithm was developed for multi-objective RNP problem. …”
Get full text
Get full text
Article -
4
Improved elitist genetic algorithm for reactive power planning in power system / Mohamad Fadhil Mohd Kamal
Published 2010“…The study adopts the reading produced by the EGA as the benchmark for drawing any judgment towards developing the improved EGA.…”
Get full text
Get full text
Thesis -
5
ANFIS modelling of a twin rotor system using particle swarm optimisation and RLS
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
8
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
9
Neuro-Fuzzy and Particle Swarm Optimization based Model for the Steam and Cooling sections of a Cogeneration and Cooling Plant
Published 2009“…Neuro-fuzzy approach trained by a sequence of optimization algorithms-Particle Swarm Optimization (PSO) followed by Back-Propagation (BP)-is used to develop models for the steam drum pressure, steam drum water level, steam flow rate and chilled water supply temperature. …”
Get full text
Conference or Workshop Item -
10
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
14
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
15
New approach of cryptography algorithm for e- mail applications
Published 2005“…The main steps in this algorithm started with reading the plain text "Original Message" from the user. …”
Get full text
Get full text
Conference or Workshop Item -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
Design of DNA fragment assembly using IWP method on application-specific integrated-circuit / Hasniliati Hassan
Published 2017“…Depending on the technology used, it can only read small pieces of base between 20 to 1000 bases. …”
Get full text
Get full text
Thesis -
18
T-way testing : a test case generator based on melody search algorithm
Published 2015“…This thesis is research on developing a T-Way Testing : A Test Case Generator Based On Melody Search Algorithm (TTT-MS) to generate optimum final test list. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Design and performance analysis of a fast 4-way set associative cache controller using Tree Pseudo Least Recently Used algorithm
Published 2023“…A key feature of this design is the incorporation of the Tree Pseudo Least Recently Used (PLRU) algorithm for cache replacement, a strategic choice aimed at optimizing cache performance. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan A...
Published 2023“…The problem statement revolves around the need for an efficient approach to classify application reviews to their sentiments, such as the user’s downloaded application not working as intended, and it can take time for users to read every single review. The project's objectives are to study the classifying approach of Google Play Store application reviews using the Decision Tree algorithm, develop a prototype of a classifying application program, and evaluate the accuracy model of the review classification program. …”
Get full text
Get full text
Get full text
Article
