Search Results - (( java segmentation using algorithm ) OR ( using message scheduling algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Enhancing Market-Based Scheduling Algorithm on Globally Distributed Web Servers Using Least Suitable Sealed Bid Technique by Al-Ewiwi, Mahmoud

    Published 2006
    “…Each of these agents is connected directly to a different scheduling server. These agents work cooperatively with each other through the Internet using message exchanging.An improved algorithm was implemented to decrease the amount of message exchanging between agents, which increased the performance of the system.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Exp-bet packet scheduling algorithm for multiple traffic services in long term evolution (LTE) system / Ku Siti Syahidah Ku Mohd Noh by Ku Mohd Noh, Ku Siti Syahidah

    Published 2016
    “…Thus, it is important to choose an optimal packet scheduler scheme to be used in order to schedule this active flow. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks by Raja Mohd Auzar, Tengku Dian Shahida

    Published 2009
    “…Then, the Fast Zero (FastZ) algorithm is proposed, which uses a new concept called the symmetric Conflict Matrix (sCM) as a pre-scheduling technique. …”
    Get full text
    Get full text
    Thesis
  4. 4

    HATS: HetTask scheduling by Koohi, Sina Zangbari, Abdul Hamid, Nor Asilah Wati, Othman, Mohamed, Ibragimov, Gafurjan

    Published 2022
    “…To improve efficiency, task scheduling algorithms aim to decrease the volume of communication and the number of message exchanges. …”
    Get full text
    Get full text
    Article
  5. 5

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  7. 7
  8. 8

    An efficient network mobility management for a 6LoWPAN mobile network in hospital environments by Shahamabadi, Mohammadreza Sahebi

    Published 2017
    “…Simulation results show that the proposed solution reduces traffic congestion at MR by using the HWSN6 handover solution and the message-scheduling algorithm in the tunnelling process. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R.

    Published 2023
    “…In this study, a new security system design for securing GSM messaging with a lightweight PRINCE algorithm Intellectual Property (IP) Core using Field Programmable Gate Arrays (FPGA) is proposed. …”
    Article
  10. 10

    Energy-aware task scheduling for streaming applications on NoC-based MPSoCs by Abd Ishak, Suhaimi Abd Ishak, Wu, Hui, Tariq, Umair Ullah

    Published 2024
    “…Our approach is supported by a set of novel techniques, which include constructing an initial schedule based on a list scheduling where the priority of each task is its approximate successor-tree-consistent deadline such that the workload across all the processors is balanced, a retiming heuristic to transform intraperiod dependencies into inter-period dependencies for enhancing parallelism, assigning an optimal discrete frequency for each task and each message using a Non-Linear Programming (NLP)-based algorithm and an Integer-Linear Programming (ILP)-based algorithm, and an incremental approach to reduce the memory usage of the retimed schedule in case of memory size violations. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    TDMA scheduling analysis of energy consumption for iot wireless sensor network by Islam, Md Ashikul

    Published 2019
    “…The algorithm use time division multiplexing algorithm together with hello message to allocate the neighbors and their energy level to find the best way to communicate and reduce packet drop, less signal interference and increase throughput. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    MEMPHA: Model of Exascale message-passing programs on heterogeneous architectures by Koohi, Sina Zangbari, Abdul Hamid, Nor Asilah Wati, Othman, Mohamed, Ibragimov, Gafurjan

    Published 2020
    “…The mapping algorithm uses the model of the parallel application and maps its tasks to processors in a way to minimize the total execution time. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Text classification using Naive Bayes: An experiment to conference paper by Sainin, Mohd Shamrie

    Published 2005
    “…The basic text classification technique in forum application has been discussed in Sainin (2005a) and Sainin (2005b).The paper explains about the use of the basic naïve Bayes algorithm to classify forum text me ssages into two classes namely clean and bad. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    QoS BASED ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORK by NAZIR, BABAR

    Published 2012
    “…Clustering within normal sensor nodes is done by optimizing the network/coverage lifetime through a cluster-head-selection algorithm and a sleep/wake scheduling algorithm. QoSEC resolves the hot spot problem and prolongs network/coverage lifetime. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…Second, an improved steganographic algorithm based on the infamous Least Significant Bit (LSB) is proposed for hiding the sensed data scheduled for transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    The application of metaheuristics in network routing and inventory routing problem / Huda Zuhrah Ab Halim by Huda Zuhrah, Ab Halim

    Published 2012
    “…We proposed two different VNS; VNSIRP with Generalized Insertion Method (GENI) as a local search and enhanced VNS with GENI is used to construct the neighborhood structure. We evaluate both algorithms on a set data and enhanced VNS performs better with a slightly higher computational time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A review of electric vehicle charging management based on the communication between EV, RSU and CS by Mohammed D., Mansor M.B., Hock G.C.

    Published 2024
    “…Besides, this paper explains the algorithm used to schedule electric vehicle charging based on the connection between V2I and V2G. …”
    Conference Paper
  20. 20

    Multicasting in WDM Single-Hop Local Lightwave Networks by Yousif, Rabi W.

    Published 2000
    “…Upon receipt of this information all nodes run a deterministic distributed algorithm to schedule the transmission of the multicast packet. …”
    Get full text
    Get full text
    Thesis