Search Results - (( java implementation bees algorithm ) OR ( using sharing process algorithm ))
Search alternatives:
- java implementation »
- implementation bees »
- process algorithm »
- sharing process »
- bees algorithm »
- using sharing »
-
1
Efficient usage strategy of limited shared memory in Graphical Processing Unit (GPU) for accelerate DNA sequence alignment / Ahmad Hasif Azman
Published 2023“…In this study, the focus is on utilizing the memory capabilities of GPUs to accelerate the Smith-Waterman algorithm has been proposed. Three new approaches based on global memory, shared memory and a combination of global and shared memory are used in this design. …”
Get full text
Get full text
Thesis -
2
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. …”
Get full text
Get full text
Thesis -
3
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
4
Accounting Information Systems Genetic Algorithms for All-Optical Shared Fiber-Delay-Line Packet Switches
Published 2009“…Although this approach is superior to other algorithms, its overall complexity and processing overheads are still too high to warrant its day to day use. …”
Get full text
Get full text
Get full text
Article -
5
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. …”
Get full text
Get full text
Thesis -
6
Secure encryption in network using Data Encryption Standard (DES) for high security transmission
Published 2017“…In the field of network security, the role of cryptography is most important. A secrecy key and shared key algorithm is known as a symmetric key algorithm. …”
Get full text
Get full text
Student Project -
7
Social learning and principal-agent problems in profit sharing contract
Published 2023“…The data are collected from the period of 2009 to 2013 and it will be used for the simulation process by utilizing the genetic algorithm technique. …”
Article -
8
Automatic generic process migration system in linux
Published 2012“…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
Get full text
Get full text
Thesis -
9
CPU Burst Processes Prioritization Using Priority Dynamic Quantum Time Algorithm: A Comparison with Varying Time Quantum and Round Robin Algorithms
Published 2015“…In Round-Robin Scheduling, the time quantum is fixed and processes are scheduled such that no process uses CPU time more than one time quantum in one go. …”
Get full text
Get full text
Get full text
Article -
10
Effects of Different Superpixel Algorithms on Interactive Segmentations
Published 2022“…Though employed as pre-processing step in many interactive segmentation algorithms, to date, no study has been conducted to assess the effects of such incorporations on the segmentation algorithms. …”
Get full text
Get full text
Get full text
Article -
11
Modified workflow scheduling using hybrid PSO-GA algorithm in cloud computing
Published 2019“…Cloud computing environment offers customers with multiple on-demand services and resource sharing. Business processes are managed using cloud-based workflow technology, which is one of the difficulties of using resources efficiently owing to the inter-task dependencies. …”
Get full text
Get full text
Thesis -
12
CPU scheduling with a round Robin algorithm based on an effective time slice
Published 2017“…Although there are other CPU scheduling algorithms based on processing time which use different criteria, the round robin algorithm has gained much popularity due to its optimal time-shared environment. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Book Section -
14
Effects of Different Superpixel Algorithms on Interactive Segmentations
Published 2022“…Though employed as pre-processing step in many interactive segmentation algorithms, to date, no study has been conducted to assess the effects of such incorporations on the segmentation algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…CPU implementations are becoming less efficient in handling the computation of crypto algorithms. Hence, other contemporary processor architectures such as GPU and FPGA have become popular alternative to speed up the computation in recent years.This dissertation first discusses several existing large integer multiplication algorithms and reviews different methods used to implement thediscussed algorithms done by other researchers in both Graphic Processing Unit (GPU) and Field Programmable Gate Array (FPGA).Compared to GPU, FPGA offered more low level design and development to the implementation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Sizes of Superpixels and their Effect on Interactive Segmentation
Published 2021“…Pre-processing steps can be used to speed up the segmentation process while improving the end result. …”
Get full text
Get full text
Get full text
Proceeding -
17
Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau
Published 2020“…Production line commonly used algorithm such as shortest processing time (SPT), longest processing time (LPT), cycle time optimization and centre of gravity (CoG) algorithm are coded in this system which enables the production schedule and sequence to be optimized. …”
Get full text
Get full text
Get full text
Thesis -
18
Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems
Published 2020“…This indicates the capability of the algorithm in exploring the search space. The 2S-ENDSHHMO algorithm can be used to improve the search process of other MOSI-based algorithms and can be applied to solve MOPs in applications such as structural design and signal processing.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Max-average: an extended max-min scheduling algorithm for Grid computing environtment
Published 2016“…This paper presents a new proposed grid based scheduling algorithm called Max-Average, inspired from Max-Min algorithm. …”
Get full text
Get full text
Get full text
Article -
20
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…The protocol defines the procedures which engage two layers of deniability techniques; namely Secret Sharing and Valid Fake Messages. Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. …”
Get full text
Get full text
Thesis
