Search Results - (( java application optimization algorithm ) OR ( data reduction function algorithm ))

Refine Results
  1. 1
  2. 2

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    New Learning Models for Generating Classification Rules Based on Rough Set Approach by Al Shalabi, Luai Abdel Lateef

    Published 2000
    “…Two different models for learning in data sets were proposed based on two different reduction algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    HDRA: A Haybird Data Reduction and Routing Algorithm by Hussein, M. K., Marghescu, Ion, A. M. Alduais, Nayef

    Published 2024
    “…Consequently, this study introduces a Hybrid Data Reduction and Routing Algorithm (HDRA). The principal aim of HDRA is to prolong the lifespan of clusterbased WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    HDRA: A Haybird Data Reduction and Routing Algorithm by M. K. Hussein, M. K. Hussein, Ion Marghescu, Ion Marghescu, Nayef A. M. Alduais, Nayef A. M. Alduais

    Published 2024
    “…Consequently, this study introduces a Hybrid Data Reduction and Routing Algorithm (HDRA). The principal aim of HDRA is to prolong the lifespan of clusterbased WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…In this work a feeder reconfiguration algorithm is presented for the purpose of power loss reduction in distribution networks. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Examination timetabling using genetic algorithm case study: KUiTTHO by Mohd Salikon, Mohd Zaki

    Published 2005
    “…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Data-based PID control of flexible joint robot using adaptive safe experimentation dynamics algorithm by Mohd Ashraf, Ahmad, Haszuraidah, Ishak, Ahmad Nor Kasruddin, Nasir, Normaniha, Abd Ghani

    Published 2021
    “…The ASED algorithm is an enhanced version of SED algorithm where the updated tuning variable is modified to adapt to the change of the objective function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Examination Timetabling Using Genetic Algorithm Case Study : KUiTTHO by Mohd. Zaki, Mohd. Salikon

    Published 2005
    “…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…The deployment of network security procedures requires the implementation of cryptographic functions. More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
    Get full text
    Get full text
    Thesis