Search Results - (( java application optimized algorithm ) OR ( based context ((a algorithm) OR (_ algorithm)) ))
Search alternatives:
- optimized algorithm »
- java application »
- based context »
- a algorithm »
-
1
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
2
Context aware traffic scheduling algorithm for power distribution smart grid network
Published 2023Article -
3
Providing Ubiquitous Positioning Using Context Aware Handover Algorithm
Published 2012“…This research alms to solve the problem of ubiquitous positioning by designing a context aware handover algorithm for positioning systems. …”
Get full text
Get full text
Thesis -
4
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
text::Thesis -
5
Machine learning algorithms in context of intrusion detection
Published 2016Get full text
Get full text
Conference or Workshop Item -
6
Mobile user location prediction: genetic algorithm-based approach
Published 2010“…This paper presents a prediction of user location using genetic algorithm and based location history in finding a number of solutions of possible location when applied to recorded context histories, framework is presented and the result are discussed. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
8
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. …”
Get full text
Get full text
Get full text
Thesis -
9
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023“…To achieve context recognition, the algorithm mines the keywords and identifies the potential context from analysing a paper�s abstract. …”
Article -
10
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…Furthermore, the proposed techniques based on the Q-Learning algorithm do not consider context-based actions. …”
Get full text
Get full text
Article -
11
Clustering ensemble learning method based on incremental genetic algorithms
Published 2012“…In the first and second phases, a threshold fuzzy c-means clustering algorithm as a clusterer and a pattern ensemble learning method based on the incremental genetic-based algorithms are proposed respectively. …”
Get full text
Get full text
Thesis -
12
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
13
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
14
CPU scheduling with a round Robin algorithm based on an effective time slice
Published 2017“…This paper presents a new effective round robin CPU scheduling algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
A comparative study of greedy algorithms and dynamic programming in road network / Nuralya Sofea Hairulanuar
Published 2024“…This study provides an in-depth analysis of four well-known algorithms which are Dijkstra's algorithm, A* algorithm, Floyd Warshall, and Bellman Ford in the context of optimizing road networks. …”
Get full text
Get full text
Thesis -
16
Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection
Published 2014“…Edge Adaptive Least significant bit Matching Revisited(EALMR) steganography algorithm is high safety spatial domain information hiding technique which can choose embedding area based on the image context. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data
Published 2019“…To address this issue, we propose an efficient algorithm to measure the similarity indexes of multivariate data sets using a non-metric-based methodology. …”
Get full text
Get full text
Article -
18
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article -
20
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project
