Search Results - (( java application need algorithm ) OR ( using execution based algorithm ))
Search alternatives:
- java application »
- application need »
- using execution »
- execution based »
- need algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis outlines the two different implementation techniques of the existing FLEX algorithm using java based parsers and using a query language for XML. …”
Get full text
Get full text
Thesis -
2
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Automated time series forecasting
Published 2011“…Moving Average, Decomposition, Exponential Smoothing, Time Series Regressions and ARIMA) were used.The algorithm was developed in JAVA using up to date forecasting process such as data partition, several error measures and rolling process.Successfully, the results of the algorithm tally with the results of SPSS and Excel.This automatic forecasting will not just benefit forecaster but also end users who do not have in depth knowledge about forecasting techniques.…”
Get full text
Get full text
Get full text
Monograph -
4
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
5
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…Eventually, the workflow is executed. The second algorithm is a variation in first algorithm in which data parallelism is introduced in each partition. …”
Get full text
Get full text
Get full text
Thesis -
6
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…In ELB algorithm, the tasks are distributed among resources based on their execution time range. …”
Get full text
Get full text
Get full text
Thesis -
7
RISC-V instruction set extension on blockchain application
Published 2024“…Towards the end of the project, the algorithms would be executed in a base RISC-V core and an extended RISC-V core using simulation tools to perform performance analysis. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Bitwise-based Routing Algorithms in Optical Multistage Interconnection Network
Published 2007“…Under the constraint of avoiding crosstalk, the interests of these algorithms are to find a permutation that uses a minimum number of passes and minimum execution time. …”
Get full text
Get full text
Thesis -
9
-
10
An integrated model of automated elementary programming feedback using assisted and recommendation approach
Published 2017“…Meanwhile, similar difficulty groups of the computer programs were generated using a K-Means clustering algorithm that was enhanced with ranking consideration. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…For case study 2, the ACO algorithm achieved a best distance of 1071 (u) with execution time 1.91 (s), while the GA algorithm resulted in a best distance of 1082 (u) with execution time 0.08 (s). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A performance analysis of association rule mining algorithms
Published 2016“…The results of the CPU profiler of Java VisualVM showed that Binary-Based algorithm performs better than Eclat algorithm in-terms of both execution times and memory usage. …”
Get full text
Get full text
Conference or Workshop Item -
14
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
A Comparison Study Between Two Algorithms Particle Swarm Optimization for Depth Control of Underwater Remotely Operated Vehicle
Published 2013“…In this research, an improved PSO algorithm using a priority-based fitness PSO (PFPSO) and priority-based fitness binary PSO (PFBPSO) approach. …”
Get full text
Get full text
Get full text
Article -
17
Hybrid Cat Swarm Optimization and Simulated Annealing for Dynamic Task Scheduling on Cloud Computing Environment
Published 2018“…Quantitative analysis of the algorithm is carried out with metrics of execution time, execution cost, QoS and performance improvement rate percentage. …”
Get full text
Get full text
Get full text
Article -
18
Development of efficient t-way test data generation algorithm and execution strategies
Published 2012“…(III) R2Way (Random Search for 2-way Test Data Generation) with execution tool is developed to support both uniform and non-uniform values using search based software engineering. …”
Get full text
Get full text
Thesis -
19
Optimizing BOINC scheduling using genetic algorithm based on thermal profile
Published 2014“…We use genetic algorithm to find the best combination of clients and jobs based on clients order and least execution time. …”
Get full text
Get full text
Conference or Workshop Item -
20
Ambulance shortest path problem by using link-based algorithm
Published 2015Get full text
Get full text
Academic Exercise
