Search Results - (( java segmentation using algorithm ) OR ( using message scheduling algorithm ))
Search alternatives:
-
1
Enhancing Market-Based Scheduling Algorithm on Globally Distributed Web Servers Using Least Suitable Sealed Bid Technique
Published 2006“…Each of these agents is connected directly to a different scheduling server. These agents work cooperatively with each other through the Internet using message exchanging.An improved algorithm was implemented to decrease the amount of message exchanging between agents, which increased the performance of the system.…”
Get full text
Get full text
Thesis -
2
Exp-bet packet scheduling algorithm for multiple traffic services in long term evolution (LTE) system / Ku Siti Syahidah Ku Mohd Noh
Published 2016“…Thus, it is important to choose an optimal packet scheduler scheme to be used in order to schedule this active flow. …”
Get full text
Get full text
Thesis -
3
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…Then, the Fast Zero (FastZ) algorithm is proposed, which uses a new concept called the symmetric Conflict Matrix (sCM) as a pre-scheduling technique. …”
Get full text
Get full text
Thesis -
4
HATS: HetTask scheduling
Published 2022“…To improve efficiency, task scheduling algorithms aim to decrease the volume of communication and the number of message exchanges. …”
Get full text
Get full text
Article -
5
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
7
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
An efficient network mobility management for a 6LoWPAN mobile network in hospital environments
Published 2017“…Simulation results show that the proposed solution reduces traffic congestion at MR by using the HWSN6 handover solution and the message-scheduling algorithm in the tunnelling process. …”
Get full text
Get full text
Thesis -
9
Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA
Published 2023“…In this study, a new security system design for securing GSM messaging with a lightweight PRINCE algorithm Intellectual Property (IP) Core using Field Programmable Gate Arrays (FPGA) is proposed. …”
Article -
10
Energy-aware task scheduling for streaming applications on NoC-based MPSoCs
Published 2024“…Our approach is supported by a set of novel techniques, which include constructing an initial schedule based on a list scheduling where the priority of each task is its approximate successor-tree-consistent deadline such that the workload across all the processors is balanced, a retiming heuristic to transform intraperiod dependencies into inter-period dependencies for enhancing parallelism, assigning an optimal discrete frequency for each task and each message using a Non-Linear Programming (NLP)-based algorithm and an Integer-Linear Programming (ILP)-based algorithm, and an incremental approach to reduce the memory usage of the retimed schedule in case of memory size violations. …”
Get full text
Get full text
Get full text
Article -
11
-
12
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The algorithm use time division multiplexing algorithm together with hello message to allocate the neighbors and their energy level to find the best way to communicate and reduce packet drop, less signal interference and increase throughput. …”
Get full text
Get full text
Thesis -
13
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…Boruta algorithm is used to select features automatically for assisting the machine learning. …”
Get full text
Get full text
Get full text
Article -
14
MEMPHA: Model of Exascale message-passing programs on heterogeneous architectures
Published 2020“…The mapping algorithm uses the model of the parallel application and maps its tasks to processors in a way to minimize the total execution time. …”
Get full text
Get full text
Get full text
Article -
15
Text classification using Naive Bayes: An experiment to conference paper
Published 2005“…The basic text classification technique in forum application has been discussed in Sainin (2005a) and Sainin (2005b).The paper explains about the use of the basic naïve Bayes algorithm to classify forum text me ssages into two classes namely clean and bad. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
QoS BASED ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORK
Published 2012“…Clustering within normal sensor nodes is done by optimizing the network/coverage lifetime through a cluster-head-selection algorithm and a sleep/wake scheduling algorithm. QoSEC resolves the hot spot problem and prolongs network/coverage lifetime. …”
Get full text
Get full text
Thesis -
17
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…Second, an improved steganographic algorithm based on the infamous Least Significant Bit (LSB) is proposed for hiding the sensed data scheduled for transmission. …”
Get full text
Get full text
Get full text
Thesis -
18
The application of metaheuristics in network routing and inventory routing problem / Huda Zuhrah Ab Halim
Published 2012“…We proposed two different VNS; VNSIRP with Generalized Insertion Method (GENI) as a local search and enhanced VNS with GENI is used to construct the neighborhood structure. We evaluate both algorithms on a set data and enhanced VNS performs better with a slightly higher computational time.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A review of electric vehicle charging management based on the communication between EV, RSU and CS
Published 2024“…Besides, this paper explains the algorithm used to schedule electric vehicle charging based on the connection between V2I and V2G. …”
Conference Paper -
20
Multicasting in WDM Single-Hop Local Lightwave Networks
Published 2000“…Upon receipt of this information all nodes run a deterministic distributed algorithm to schedule the transmission of the multicast packet. …”
Get full text
Get full text
Thesis
