Search Results - (( java adaptation optimization algorithm ) OR ( based instruction usage algorithm ))
Search alternatives:
- adaptation optimization »
- instruction usage »
- java adaptation »
- usage algorithm »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Cache replacement algorithm using hierarchical allocation scheduling
Published 2014“…HAS is to schedule the instructions based on the priority of instructions from the aspect of space and time. …”
Get full text
Get full text
Thesis -
3
Cloud computing load balancing technique with virtual machine migration / Rabiatul Addawiyah Mat Razali
Published 2017“…Besides that, the performance of this technique is analyzed by using a Cloudsim simulator. Based on the analysis, positive results of the proposed algorithm are demonstrated, which shows the load balancing process is shown to have improved based on the distribution of virtual machines onto matching-type of resources, while a more efficient migration of virtual machines can be seen based on the defined CPU usage thresholds. …”
Get full text
Get full text
Thesis -
4
Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device
Published 2021“…In order to make BCI useful, one of the approaches is to classify the EEG time series signal that may indicate given eye movements that will be used as input instructions to a device. This research will investigate the application of the Symbolic Aggregate Approximation (SAX) algorithm on top of known supervised machine learning techniques to perform EEG signal classification. …”
Get full text
Thesis -
5
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…We analyse the solution and compare with a range of well-known algorithms in terms of compression ratio, memory usage, the number of instructions, compression speed and energy consumption. …”
Get full text
Get full text
Get full text
Thesis -
7
Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework
Published 2022“…They are part of a tech-savvy generation that led to technological progress that is always connected and linked based on their wishes and needs without any hesitation of time and place. …”
Get full text
Get full text
Get full text
Article
