Search Results - (( java implication based algorithm ) OR ( data evaluation a algorithm ))
Search alternatives:
- implication based »
- java implication »
- data evaluation »
- evaluation a »
- a algorithm »
-
1
-
2
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
Published 2015“…A data center comprises of servers, storage devices, cooling and power delivery equipment to support other components, exchange data and information to provide general services such as software-as-a-service (SaaS), Platform-as-a-Service (PaaS)and Internet-as-a-Service (IaaS). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
A Comparative Study Of Blockchain Algorithms For Non-Fungible Token
Published 2023“…Therefore, this research will be a breakthrough of NFTs which could evaluate the performance of blockchain algorithms and determine the most suitable algorithms that may apply to NFTs. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism
Published 2025“…The core of the algorithm utilizes a Genetic Algorithm (GA) to find the optimal position for the first evaluator by minimizing the total distance between this evaluator and all CCTV nodes, aiming for surveillance efficiency. …”
Conference paper -
6
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…The performance metrics studied are the energy dissipation, execution time, and size of encryption data. The results of evaluation AES, SF and SIT algorithms in terms of encrypted data size (bytes) showed that, the SIT algorithm produce the lowest size for all encrypted Images which is below 90250bytes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Performance evaluation of caching placement algorithms in named data network for video on demand service
Published 2016“…The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). …”
Get full text
Get full text
Get full text
Thesis -
8
Case Slicing Technique for Feature Selection
Published 2004“…One of the problems addressed by machine learning is data classification. Finding a good classification algorithm is an important component of many data mining projects. …”
Get full text
Get full text
Thesis -
9
Analysis of string matching compression algorithms
Published 2008“…Thus, this study incorporates compression to main memory in order to fully utilize its resources and improve performance of data access. This project evaluates the performance of the compression algorithms in order to increase the performance of memory access. …”
Get full text
Get full text
Article -
10
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data
Published 2019“…The performance of the algorithms is evaluated on the basis of several benchmark data sets and a dynamic multivariate data set, which is obtained from a WSN deployed in the Ghulam Ishaq Khan (GIK) Institute of Engineering Sciences and Technology. …”
Get full text
Get full text
Article -
11
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
12
Performance evaluation of marker recognition algorithm for mobile augmented reality in the real environment
Published 2023“…Hence, a performance evaluation of the AR algorithm in a real controlled environment is proposed in this paper. …”
Get full text
Get full text
Get full text
Article -
13
Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH
Published 2018“…This study is proposing a new algorithm of Box-Jenkins and GARCH (or BJ-G) in evaluating the multistep forecasting performance of the BJ-G model for highly volatile time series data. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…Eventually, the workflow is executed. The second algorithm is a variation in first algorithm in which data parallelism is introduced in each partition. …”
Get full text
Get full text
Get full text
Thesis -
16
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…Each image went through the embedding process by the evaluated algorithms. This enhanced image data numbers then went through Logistic Regression as a classifier. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Replica Creation Algorithm for Data Grids
Published 2012“…This thesis presents a new replication algorithm that improves data access performance in data grids by distributing relevant data copies around the grid. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Evaluation of fall detection classification approaches
Published 2012“…The acceleration data with a total data of 6962 instances and 29 attributes were used to evaluate the performance of the different classification algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
19
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
Get full text
Get full text
Get full text
Article -
20
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Published 2024thesis::master thesis
