Search Results - (( filing implementation case algorithm ) OR ( java optimization modified algorithm ))
Search alternatives:
- filing implementation »
- optimization modified »
- implementation case »
- java optimization »
- case algorithm »
-
1
-
2
Implementing BiSM and CCL algorithm for managing audio storage
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
4
Prototype development for embedding large amount of information using secure LSB and neural based steganography
Published 2009“…The need for new methods, techniques and algorithms to make enhancements regarding increasing the amount the hidden information, preserving the host file quality, preserving the size of the file, and keep it robust against steganalysis. …”
Get full text
Get full text
Thesis -
5
Test Cases Minimization Strategy Based On Flower Pollination Algorithm
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2017“…The proposed overall inverter design and the control algorithm are modelled using MATLAB environment (Simulink/m-file Code). …”
Get full text
Get full text
Get full text
Article -
7
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
8
Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.]
Published 2021“…Therefore, this project intended to provide a better platform for local neighbourhood to file their complaint and the local council to address the filed complaint. …”
Get full text
Get full text
Get full text
Book Section -
9
Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine
Published 2019“…Today, JPEG image files are popular file formats that have less structured contents which make its carving possible in the absence of any file system metadata. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
11
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
12
A network based fetal ECG monitoring algorithm
Published 2011“…Proposed system is used to study numbers of cases and satisfactory result is found compared with conventional systems.…”
Get full text
Get full text
Get full text
Article -
13
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Thus the main objective of this study is to implement an automatic algorithm to previous algorithm to make it fully automatic system. …”
Get full text
Get full text
Thesis -
16
-
17
Workload performance evaluation of large spatial database for DSS based disaster management
Published 2017“…Then, all the workload that are obtained to determine the processes are recorded into one excel file. The Case Based Reasoning (CBR) optimized with Hash Search Technique has been adopted in this study for the purpose of evaluating and predicting the workload performance of PostgreSQL DBMS. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
19
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Another different case of cybersecurity is the Distributed Denial of Services (DDoS) attack. …”
Get full text
Get full text
Thesis
