Search Results - (( java implication based algorithm ) OR ( data evaluation between algorithm ))

Refine Results
  1. 1
  2. 2

    Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism by Alomari M.F., Mahmoud M.A., Gharaei N., Rasool S.M., Hasan R.A.

    Published 2025
    “…The core of the algorithm utilizes a Genetic Algorithm (GA) to find the optimal position for the first evaluator by minimizing the total distance between this evaluator and all CCTV nodes, aiming for surveillance efficiency. …”
    Conference paper
  3. 3

    Performance evaluation for different data encryption algorithms on wireless sensor network (WSN) by Mhawesh, Thoalfekarali Zuhair

    Published 2018
    “…The performance metrics studied are the energy dissipation, execution time, and size of encryption data. The results of evaluation AES, SF and SIT algorithms in terms of encrypted data size (bytes) showed that, the SIT algorithm produce the lowest size for all encrypted Images which is below 90250bytes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Comparative Study between Flower Pollination Algorithm and Cuckoo Search Algorithm for t-way Test Data Generation by Abdullah, Nasser, Kamal Z., Zamli

    Published 2018
    “…This paper presents a comparative study between two meta-heuristic strategies for t-way test data generation: Flower Pollination Algorithm (FPA) and Cuckoo Search (CS). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Disparity between theory & practice beyond the worst-case competitive analysis by Iqbal, Javeria, Ahmad, Iftikhar, Shah, Asadullah

    Published 2019
    “…In this work, we contribute towards bridging the gap between theory and practice by considering a set of algorithms for online conversion problems and discuss the disparity between the assumed worst case competitive rations and experimentally achieved competitive ratios using real world data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…This separation contributes in determining the effect of access point on the network performance as well as it allows in evaluating the algorithms that based on the differentiation between the access point and stations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    An Experimental Study on Relationship between Performance and Energy Consumption of Serial and Parallel Text Searching Algorithm. by Isahak, Siti Zulaikha

    Published 2013
    “…How to reduce execution time in searching large amount of data? In this paper, text searching algorithm is using to study the relationship between performance of computer and amount of energy produced in serial and parallel text searching algorithm. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Replica Creation Algorithm for Data Grids by Madi, Mohammed Kamel

    Published 2012
    “…This thesis presents a new replication algorithm that improves data access performance in data grids by distributing relevant data copies around the grid. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents by Zulcaffle, Tengku Mohd Afendi

    Published 2007
    “…The reliability of the proposed algorithms have been tested over simulated and real data. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti by Abd Mokti, Nurnazifah

    Published 2024
    “…The project involves data collection, data preparation, and the implementation of the decision tree algorithm for price prediction. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Analysis of tumour control probability, normal tissue complication probability and isotoxic effects for prostate cancer by Fauzee, Nurnada Syahrain Mohd

    Published 2016
    “…Variation in evaluation method will not give similar findings even same data is used. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Fatigue data editing algorithm for automotive applications by Shahrum Abdullah, John R. Yates, Joseph A. Giacornin

    Published 2005
    “…Bumps are extracted from each wavelet group at a specific trigger level, which is set automatically according to the global signal statistics comparison between the original and bump signals. The accuracy of the algorithm has been evaluated by application to two experimentally measured data sets containing tensile and compressive preloading conditions. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. Detailed comparison between Twofish and RC6 algorithms has been made with respect to AES algorithm.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster by Ali, Wala'a Hussein

    Published 2018
    “…In this project three different data aggregation algorithms coding schemes based relative difference (CS-RD), an adaptive method of data aggregation that exploits the spatial correlation between the sensor nodes (ADAM) and coding schemes based the factor of precision (CS-FP) are evaluated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Mutable composite firefly algorithm for gene selection in microarray based cancer classification by Fajila, Mohamed Nisper Fathima

    Published 2022
    “…The proposed hybrid algorithm known as CFS-Mutable Composite Firefly Algorithm (CFS-MCFA) was evaluated on cancer microarray data for biomarker selection along with the deployment of Support Vector Machine (SVM) as the classifier. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Robust generalized multiplicative scatter correction algorithm on pretreatment of near infrared spectral data by Silalahi, Divo Dharma, Midi, Habshah, Arasan, Jayanthi, Mustafa, Mohd Shafie, Caliman, Jean-Pierre

    Published 2018
    “…In this paper, several different classical pretreatment methods were evaluated and a new robust Generalized Multiplicative Scatter Correction (GMSC) algorithm was proposed to correct the additive and/or multiplicative baseline effects in the spectral data. …”
    Get full text
    Get full text
    Article
  20. 20

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
    Get full text
    Get full text
    Get full text
    Thesis