Search Results - (( java based e algorithm ) OR ( basic computer usage algorithm ))
Search alternatives:
- usage algorithm »
- basic computer »
- computer usage »
- e algorithm »
- based e »
- java »
-
1
Web usage mining for UUM learning care using association rules
Published 2004Get full text
Get full text
Thesis -
2
-
3
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The semantic similarity measure algorithm is used to compute the similitude strength between the Gene Ontology terms. …”
Get full text
Get full text
Get full text
Article -
4
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…Therefore, a simple and practical computational method that is more accurate, faster, easy to configure and use, and bears low computing cost is needed particularly for offline usage. …”
Get full text
Get full text
Monograph -
5
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Performance of the proposed algorithm was evaluated on the developed number plates’ image database captured by mobile phone’s camera, i.e. 30 images. …”
Get full text
Get full text
Get full text
Book -
6
Petri Net Algorithm for controlling and monitoring system
Published 2009Get full text
Working Paper -
7
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…Overall, the final results showed that the new designed algorithm (i.e., MiBSA algorithm) has successfully improved grid processing performance and successfully surpassed the performance of previous algorithm.…”
Get full text
Get full text
Get full text
Thesis -
8
A random search based effective algorithm for pairwise test data generation
Published 2011“…Java program has been used to test the performance of the algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization. …”
Get full text
Get full text
Get full text
Monograph -
10
-
11
Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework
Published 2022“…It is undeniable that a digital native must begin with at least a basic level of computer knowledge in order to manage their education and daily life. …”
Get full text
Get full text
Get full text
Article -
12
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…Information security is now of the utmost importance since it aims to safeguard data that is valuable to individuals and companies thus a variety of encryption methods have been studied due to the numerous risks and vulnerabilities that computer networks have. Now, sensitive data can be safely transmitted via the network thanks to the Cryptography Algorithm's usage of encryption to safeguard data. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
14
EasyA: Easy and effective way to generate pairwise test data
Published 2013“…Java program has been used to test the performance of the algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
16
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
17
Parametric modelling of a TRMS using dynamic spread factor particle swarm optimisation
Published 2009Get full text
Get full text
Get full text
Proceeding Paper -
18
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024“…One of the prominent methods to improve machine learning accuracy is by using ensemble method which basically employs multiple base models. In this paper, the stacking ensemble method is used to increase the accuracy of the machine learning model for LSM where the base (first-level) learners use five ML algorithms namely decision tree (DT), k-nearest neighbor (KNN), AdaBoost, extreme gradient boosting (XGB) and random forest (RF). …”
Conference Paper -
19
Automated time series forecasting
Published 2011“…Moving Average, Decomposition, Exponential Smoothing, Time Series Regressions and ARIMA) were used.The algorithm was developed in JAVA using up to date forecasting process such as data partition, several error measures and rolling process.Successfully, the results of the algorithm tally with the results of SPSS and Excel.This automatic forecasting will not just benefit forecaster but also end users who do not have in depth knowledge about forecasting techniques.…”
Get full text
Get full text
Get full text
Monograph -
20
Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz
Published 2014“…Huge reliance on computer usage in everyday life, leads to a continuous increase of large data applications in textual forms. …”
Get full text
Get full text
Thesis
