Search Results - (( java adaptation normalization algorithm ) OR ( basic computing acs algorithm ))
Search alternatives:
- adaptation normalization »
- normalization algorithm »
- java adaptation »
- basic computing »
- computing acs »
- acs algorithm »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…The designed modules is in the form of algorithms, GridSim, Java Development Kits and Java Language used to support the design process whereas the Netbeans software serves as the platform to simulate the experiment so as to obtain the results. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
-
5
AnkPlex: algorithmic structure for refinement of near-native ankyrin-protein docking
Published 2017“…Background: Computational analysis of protein-protein interaction provided the crucial information to increase the binding affinity without a change in basic conformation. …”
Get full text
Get full text
Article -
6
-
7
-
8
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The adaptive Neuro-fuzzy Inference System (ANFIS) is proposed to build the diabetic ketoacidosis classifier. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
Get full text
Get full text
Thesis -
10
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…In order to achieve this, different sets of trust information including QoS, OSNs and ant colony system (ACS) algorithm are proposed to improve the selection of trustworthy node. …”
Get full text
Get full text
Get full text
Thesis
