Search Results - (( java implementation tree algorithm ) OR ( using execution new algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- using execution »
- tree algorithm »
- execution new »
- new algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
RISC-V instruction set extension on blockchain application
Published 2024“…This would greatly shorten the instructions used by the algorithms and improved the execution time of the programmes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…In ELB algorithm, the tasks are distributed among resources based on their execution time range. …”
Get full text
Get full text
Get full text
Thesis -
6
Automatic marking system for programming subject
Published 2023“…To achieve this, this project use cloud compute resources that contain Docker container which act as an isolation for anonymous code execution. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Replica Creation Algorithm for Data Grids
Published 2012“…The new Data Replica Creation Algorithm (DRCM) improves performance of data grid systems by reducing job execution time and making the best use of data grid resources (network bandwidth and storage space). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
9
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…The special NAF property is adopted in the new {0,1,3}-NAF scalar. Also, a new point tripling formula and algorithm are introduced for elliptic curve over binary field using Lopez-Dahab projective coordinates. …”
Get full text
Get full text
Thesis -
10
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
11
A discrete simulated kalman filter optimizer for combinatorial optimization problems
Published 2022“…First, the DSKFO algorithm is used to solve the travelling salesman problem (TSP), and then the algorithm's execution time is measured. …”
Get full text
Get full text
Thesis -
12
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…Next, the Dynamic Demand Replacement Algorithm (DDRA) algorithm is used to place in-demand functions near the edge nodes periodically, while the proposed task scheduling algorithm - Maximum Revenue Bid (MRB) is used to give priority to tasks to maximise revenue near the edge. …”
Get full text
Get full text
Get full text
Article -
13
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
Published 2009“…The new proposed system is able to embed information in an execution file without change the size of execution file. …”
Get full text
Get full text
Get full text
Article -
14
-
15
A GreedyZero algorithm to minimise the conflicts in an Optical Multistage Interconnection Network
Published 2014“…In this paper, we have proposed a new algorithm to minimise the number of conflicts of OMINs using the greedy graph colouring and Zero algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Fault tolerance grid scheduling with checkpoint based on ant colony system
Published 2017“…This study proposed Dynamic ACS-based Fault Tolerance in grid computing using resubmission to new resource, checkpoint technique and utilization of resource execution history with the aim to reduce execution and task processing time and to increase the success rate in grid environment. …”
Get full text
Get full text
Get full text
Article -
17
Modelling of multi-robot system for search and rescue
Published 2023“…The MPSO algorithm introduces a new path planning scheme for determining robot’s waypoints. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Object detection system using haar-classifier
Published 2009“…The invention of new algorithms had encouraged to the reinforcement of image processing’s application. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Optimizing BOINC scheduling using genetic algorithm based on thermal profile
Published 2014“…We use genetic algorithm to find the best combination of clients and jobs based on clients order and least execution time. …”
Get full text
Get full text
Conference or Workshop Item -
20
New recursive circular algorithm for listing all permutations
Published 2014“…Computational advantages are presented that compare the results obtained by the new algorithm with those obtained using two other existing methods.The result indicates that the new algorithm is faster than the other two in time execution.…”
Get full text
Get full text
Get full text
Article
