Search Results - (( java application optimized algorithm ) OR ( data reduction function algorithm ))
Search alternatives:
- optimized algorithm »
- reduction function »
- function algorithm »
- java application »
- data reduction »
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
2
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
3
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
4
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. …”
Get full text
Get full text
Thesis -
5
-
6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
7
New Learning Models for Generating Classification Rules Based on Rough Set Approach
Published 2000“…Two different models for learning in data sets were proposed based on two different reduction algorithms. …”
Get full text
Get full text
Thesis -
8
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
9
HDRA: A Haybird Data Reduction and Routing Algorithm
Published 2024“…Consequently, this study introduces a Hybrid Data Reduction and Routing Algorithm (HDRA). The principal aim of HDRA is to prolong the lifespan of clusterbased WSNs. …”
Get full text
Get full text
Get full text
Article -
10
HDRA: A Haybird Data Reduction and Routing Algorithm
Published 2024“…Consequently, this study introduces a Hybrid Data Reduction and Routing Algorithm (HDRA). The principal aim of HDRA is to prolong the lifespan of clusterbased WSNs. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
13
-
14
Reference-free Reduction of Ballistocardiogram Artifact from EEG Data Using EMD-PCA
Published 2014Get full text
Get full text
Conference or Workshop Item -
15
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…In this work a feeder reconfiguration algorithm is presented for the purpose of power loss reduction in distribution networks. …”
Get full text
Get full text
Thesis -
16
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005“…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
Get full text
Get full text
Thesis -
17
Data-based PID control of flexible joint robot using adaptive safe experimentation dynamics algorithm
Published 2021“…The ASED algorithm is an enhanced version of SED algorithm where the updated tuning variable is modified to adapt to the change of the objective function. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
-
19
Examination Timetabling Using Genetic Algorithm Case Study : KUiTTHO
Published 2005“…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
Get full text
Get full text
Get full text
Thesis -
20
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…The deployment of network security procedures requires the implementation of cryptographic functions. More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
Get full text
Get full text
Thesis
