Search Results - (( java implementation path algorithm ) OR ( using filing system algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- system algorithm »
- path algorithm »
- filing system »
- using filing »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
A Comparative Study on Compression of Different Image File Formats
Published 1999“…In this project, an image compression format and algorithm has been analyses. A system has been created for user to convert or display image file format. …”
Get full text
Get full text
Thesis -
6
Enhanced Storage Mechanism for Secured Parallel Network File System
Published 2018“…The proposed techniques resulted synchronous LEASE file locking, capturing of state of locks and layouts, Kerberos secured the pNFS locks and layouts on storage, new algorithm enabled the scalable data compression using data block size compression algorithm and better dynamic data protection using RAID.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Classification of JPEG files by using extreme learning machine
Published 2018Get full text
Get full text
Article -
8
Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems
Published 2017“…These types of agents have different capabilities, actions, and efficiency to the irsync algorithm in file synchronization. The study proposed MAS framework in the Learning Management System (LMS) that involves the transfer of data from one machine to another. …”
Get full text
Get full text
Get full text
Thesis -
9
Relationship based replication algorithm for data grid
Published 2014“…Data Grid is an infrastructure that manages huge amount of data files and provides intensive computational resources across geographically distributed systems.To increase resource availability and to ease resource sharing in such environment, there is a need for replication services.This research proposes a replication algorithm, termed as Relationship based Replication (RBR) that integrates users, grid and system perspective.In particular, the RBR includes information of three different relationships in identifying file(s) that requires replication; file-to-user, file-to-file and file-to-grid. …”
Get full text
Get full text
Monograph -
10
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…This study uses machine learning method to detect anomalies in system log files. …”
Get full text
Get full text
Get full text
Thesis -
12
Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa
Published 2008“…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. …”
Get full text
Get full text
Thesis -
13
Dynamic replication algorithm in data grid: Survey
Published 2008“…Data replication is a common method used to improve the performance of data access in distributed systems. …”
Get full text
Get full text
Get full text
Book Section -
14
Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm
Published 2010“…human’s life sectors. People use many file types of each multimedia element such as file type of videos, audios, images,graphs, animations, texts and also live video streaming. …”
Get full text
Get full text
Conference or Workshop Item -
15
A log file analysis technique using binary-based approach
Published 2014“…Log files are an important by product of any computing systems including database systems. …”
Get full text
Get full text
Article -
16
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The results show that the most time lagging comes from image files, followed by PDF files, and then text files Moreover the encryption and decryption process using the modified system is around twice faster than the old system.…”
Get full text
Get full text
Thesis -
17
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The simulation was conducted using File Alyzer, Clone Files Checker and AllDup software. …”
Get full text
Get full text
Thesis -
18
Statistical fixed range multiple selection algorithm for peer-to-peer system
Published 2010Get full text
Get full text
Conference or Workshop Item -
19
Static range multiple selection algorithm for peer-to-peer system
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Replica Creation Algorithm for Data Grids
Published 2012“…The new Data Replica Creation Algorithm (DRCM) improves performance of data grid systems by reducing job execution time and making the best use of data grid resources (network bandwidth and storage space). …”
Get full text
Get full text
Get full text
Get full text
Thesis
