Search Results - (( exact solution clustering algorithm ) OR ( java application customization algorithm ))
Search alternatives:
-
1
Solving traveling salesman problem on cluster compute nodes
Published 2009“…The sequential algorithm is then converted into a parallel algorithm by integrating it with the Message Passing Interface (MPI) libraries so that it can be executed on a cluster computer. …”
Get full text
Get full text
Article -
2
Enhancement of Ant System Algorithm for Course Timetabling Problem
Published 2009“…For this kind of problem, researchers believe that it will be better to find an approximate solution that can be delivered by a stochastic algorithm than waiting for an exact solution from the deterministic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
3
Application of Optimization Methods for Solving Clustering and Classification Problems
Published 2011“…Next the problem of data classification is studied as a problem of global, non-smooth and non-convex optimization; this approach consists of describing clusters for the given training sets. The data vectors are assigned to the closest cluster and correspondingly to the set, which contains this cluster and an algorithm based on a derivative-free method is applied to the solution of this problem. …”
Get full text
Get full text
Thesis -
4
Data stream clustering by divide and conquer approach based on vector model
Published 2016“…The continuous effort on data stream clustering method has one common goal which is to achieve an accurate clustering algorithm. …”
Get full text
Get full text
Article -
5
Energy-efficient data transmission with clustering and compressive sensing in wireless sensor networks / Mukil Alagirisamy
Published 2020“…The solution is achieved by unequal clustering with appropriate cluster head selection and dual sink. …”
Get full text
Get full text
Get full text
Thesis -
6
Computerised Faculty Course Timetabling with Student Sectioning
Published 2016“…In ten11 of venue utilisation, two-stage heuristic solution manages to allocate exactly with the demand up to 98% but real solution can perfon11 best at only 75%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
