Search Results - (( java implementation graph algorithm ) OR ( programming mode force algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…In the benchmark paper, the result of implementation of LACE algorithm in 400, 600, 800 and 1000 servers were plotted at different graphs. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Numerical investigation of vortex-induced vibrations of a flexible riser with staggered buoyancy elements by Wu, J., Lekkala, M.K.R., Ong, M.C.

    Published 2020
    “…The obtained hydrodynamic force coefficient database can be also applied to other empirical VIV prediction programs. …”
    Get full text
    Get full text
    Article
  4. 4

    Form Finding And Shape Change Analysis Of Spine Inspired Bio-Tensegrity Model by Oh, Chai Lian

    Published 2017
    “…Computational strategies for the shape change consist of two stages: the derivation of incremental equilibrium equations and optimization of the cables forced elongation by sequential quadratic programming. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  6. 6