Search Results - (( integer application system algorithm ) OR ( java data detection algorithm ))
Search alternatives:
- integer application »
- system algorithm »
- data detection »
- java »
-
1
-
2
ZOT -Mk: A New Algorithm For Big Integer Multiplication
Published 2009Get full text
Get full text
Thesis -
3
A mixed integer linear programming model for real-time task scheduling in multiprocessor computer system
Published 2012“…The advent of multi-processor systems offers a more efficient way of processing multimedia data in real-time.With the development of appropriate scheduling algorithm, another challenge is the mode of assigning tasks in multi-processor systems.This calls for the use of an appropriate mathematical model that will take cognizance of the nature of variables involved.In this research work, a Mixed Integer Linear Programming Model (MILP) was developed to assign tasks in a multiprocessor system.The MILP model was used to assign tasks to multi-processor systems ranging between 5 and 10 homogeneous processors.The result of the simulation runs shows that with the appropriate scheduling algorithm, a high success rate ratio and guaranteed number of deadlines met could be achieved.…”
Get full text
Get full text
Get full text
Article -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
5
-
6
-
7
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
Get full text
Get full text
Thesis -
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
9
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
10
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
An effective strategy for unit commitment of microgrid power systems integrated with renewable energy sources including effects of battery degradation and uncertainties
Published 2025“…The UC problem is an exceptionally difficult optimization problem due to the mixed-integer structure, large scale, and nonlinearity. …”
Article -
13
Comparison Of Two Hybrid Algorithms On Incorporated Aircraft Routing And Crew Pairing Problems
Published 2024Get full text
Get full text
journal::journal article -
14
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
15
AN INVESTIGATION ON PARTICLE SWARM OPTIMIZATION ALGORITHM FOR DISTRIBUTION SYSTEM PLANNING WITH DISTRIBUTED GENERATION
Published 2012Get full text
Get full text
Conference or Workshop Item -
16
AN INVESTIGATION ON PARTICLE SWARM OPTIMIZATION ALGORITHM FOR DISTRIBUTION SYSTEM PLANNING WITH DISTRIBUTED GENERATION
Published 2012Get full text
Get full text
Conference or Workshop Item -
17
-
18
FPGA-based hardware implementation of optical flow constraint equation of Horn and Schunck
Published 2012Get full text
Get full text
Conference or Workshop Item -
19
Hardware architecture of OFCE-HS for hardware implementation
Published 2011Get full text
Get full text
Conference or Workshop Item -
20
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis
