Search Results - (( java implementation graph algorithm ) OR ( using message pro algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…In the benchmark paper, the result of implementation of LACE algorithm in 400, 600, 800 and 1000 servers were plotted at different graphs. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication by Ab Ghani, Mohd Ruddin, Wan Hassan, Wan Ahmas Redhauddin, Mat Hanafiah, Mohd Ariff, Raman, Siti Hajar

    Published 2013
    “…The system has been equipped with microcontroller as a main component which act as an RTU programmed using Microcontroller PRO compiler software. The RTU provides monitoring fault operation, controlling functions and data collection for analysis. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Lightweight authentication technique for secure communication of edge/fog data-centers by Yahuza, Muktar, Idris, Mohd Yamani Idna, Wahab, Ainuddin Wahid Abdul, Garba, Adamu Abdullahi, Musa, Mahadi A.

    Published 2020
    “…The security capability of the proposed scheme has been formally evaluated using the automatic cryptographic analytical tool ProVerif. …”
    Get full text
    Get full text
    Article
  5. 5

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Performance Analysis of Routing Protocols in Resource-Constrained Opportunistic Networks by Aref Hassan, Kurd Ali, Halikul, Lenando, Mohamad, Alrfaay, Slim, Chaoui, Haithem Ben, Chikha, Akram, Ajouli

    Published 2019
    “…We firstly described these protocols and presented their algorithms. Thereafter, we carried out a comparative study of these protocols using exhaustive performance testing experiments with different numbers of nodes, traffic loads, message lifetime, and buffer size. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Until the end of 20th century, mobile phones are only used to call and to send short message service (sms). …”
    Get full text
    Get full text
    Thesis