Search Results - (( java implementation using algorithm ) OR ( using scale ((data algorithm) OR (path algorithm)) ))
Search alternatives:
- implementation using »
- java implementation »
- using algorithm »
- data algorithm »
- path algorithm »
- using scale »
-
1
Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing
Published 2007“…Graphs are pervasive data structures in computer science, and algorithms working with them are fundamental to the field. …”
Get full text
Get full text
Get full text
Thesis -
2
Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria
Published 2018“…Dijkstra’s Algorithm is a shortest path algorithm that considers a single criterion only. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Nano-scale VLSI clock routing module based on useful-skew tree algorithm
Published 2006“…We implemented Useful-Skew Tree (UST) algorithm which is based on the deferred-merge embedding (DME) paradigm, as the clock layout synthesis engine. …”
Get full text
Get full text
Article -
5
-
6
-
7
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
8
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
9
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Suicide and self-harm prediction based on social media data using machine learning algorithms
Published 2023“…In combined with robust machine learning algorithms, social networking data may provide a potential path ahead. …”
Get full text
Get full text
Get full text
Article -
11
Node status detection and information diffusion in router network using scale-free network
Published 2014“…In this paper we have used the concept of scale-free network theory to design a more robust data dissemination approach which can be used in one dynamical Autonomous Systems (AS) to know the appearance and disappearance of nodes, and speedily propagate the information to all nodes in the routers network. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Deadline guarantee for scientific workflow using dynamic scheduling algorithms on IaaS clouds
Published 2018“…We will conduct a simulation experiment of scientific workflow algorithms with both of the algorithms mentioned above. …”
Get full text
Get full text
Thesis -
13
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
14
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
16
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
17
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
18
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
19
Slam-based mapping for object recognition
Published 2018“…After a map of the unknown environment is built, the Adaptive Monte Carlo Localization (AMCL) is used to localize the robot and Dijkstra’s algorithm is deployed to compute the shortest path to the destination goal. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Comparative Study of Weighted Product–Dijkstra’s Algorithm and All Possible Path Approach Based on Multiple Criteria and Multi-Dimensions
Published 2020“…Dijkstra’s algorithm was one of the shortest path algorithms that would be used to identify the path with the least cost. …”
Get full text
Get full text
Get full text
Article
