Search Results - (( java implementation tree algorithm ) OR ( based computing new algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- based computing »
- tree algorithm »
- computing new »
- new algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
4
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
5
An efficient computation technique for cryptosystems based on Lucas functions
Published 2008Get full text
Get full text
Conference or Workshop Item -
6
-
7
A priority based job scheduling algorithm in cloud computing
Published 2012“…Some intensive researches have been done in the area of job scheduling of cloud computing. In this paper we have proposed a new priority based job scheduling algorithm (PJSC) in cloud computing. …”
Get full text
Get full text
Conference or Workshop Item -
8
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…It is based on Addition Chain. The computation time for existing and new algorithms will be recorded. …”
Get full text
Get full text
Conference or Workshop Item -
9
A new computation algorithm for a cryptosystem based on Lucas Functions
Published 2008“…The experimental results of existing and new algorithm are included.…”
Get full text
Article -
10
Fairness Of the TCP-based new AIMD congestion control algorithm.
Published 2009“…Our control model is based on the assumption of the original AIMD algorithm; we show that both efficiency and fairness of AIMD can be improved. …”
Get full text
Get full text
Article -
11
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…The new scalar representation is in base 2 using digit 0, 1 and 3. …”
Get full text
Get full text
Thesis -
12
-
13
Optimizing large scale combinatorial problems using multiple ant colonies algorithm based on pheromone evaluation technique
Published 2008“…The new algorithm can effectively be used to tackle large scale optimization problems.Computational tests show promises of the new algorithm.…”
Get full text
Get full text
Get full text
Article -
14
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
15
The TCP-based new AIMD congestion control algorithm
Published 2008“…Our control model is based on the assumption of the original AIMD algorithm; we show that both efficiency and fairness of AIMD can be improved. …”
Get full text
Get full text
Get full text
Article -
16
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
17
A new variable strength t-way strategy based on the cuckoo search algorithm
Published 2019“…Complementing existing works, this paper proposes a new variable strength cuckoo search algorithm, called VCS. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Estimation-based Metaheuristics: A New Branch of Computational Intelligence
Published 2016“…In this paper, a new branch of computational intelligence named estimation-based metaheuristic is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
19
A Focal load balancer based algorithm for task assignment in cloud environment
Published 2019“…Comparisons with the krill-LB and agent-based algorithms show that the new system provides a reduction in average wait time, a significant increase in throughput, and a dramatic reduction in CPU time consumption.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item
