Search Results - (( java implementation among algorithm ) OR ( user evaluation process algorithm ))
Search alternatives:
- implementation among »
- java implementation »
- process algorithm »
- among algorithm »
- user evaluation »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
4
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
5
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
6
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
7
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
8
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
Get full text
Get full text
Thesis -
9
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks
Published 2014“…A dynamic user-wise algorithm is proposed to resolve this problem. …”
Get full text
Get full text
Thesis -
12
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
13
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…The algorithms are used to adjust the weights of the antenna array to form the appropriate beam patterns to track the desired user and null interfering users. …”
Get full text
Get full text
Thesis -
14
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…In this paper, a number of algorithms are proposed and evaluated for FaaSBid model. …”
Get full text
Get full text
Get full text
Article -
15
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
Get full text
Get full text
Thesis -
16
Implementation of generalized predictive control (GPC) for a real-time process control using labview
Published 2006“…As for this, real time control will be applied to the coupled tank as the test bed for level control process. Experimental evaluation and comparison of the predictive algorithm performance will be benchmarked against PID control. …”
Get full text
Get full text
Thesis -
17
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Segmentation of MRI brain images using statistical approaches
Published 2011“…Moreover, three improvements of EM for brain MRI segmentation are proposed, which incorporate neighbourhood information in a new manner in the clustering process. In addition, two algorithms for the post-processing of clustering results using user-interaction and the re-evaluation of boundary data in each cluster are presented. …”
Get full text
Get full text
Thesis -
19
Performance analysis of resource allocation downlink for MIMO-OFDMA system using Greedy algorithm. / Azrinawati Samaon
Published 2014“…The proposed algorithm shows comparison between the noise to sub-channel ratio and power allocation in the midst of data sub-channel for 25, 75 and 100 users. …”
Get full text
Get full text
Article -
20
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Moreover, the learning process of the proposed algorithm for behavior recognition designed as a matching factor with a password during the authentication process. …”
text::Thesis
