Search Results - (( loading communication system algorithm ) OR ( java application system algorithm ))
Search alternatives:
- loading communication »
- system algorithm »
- java application »
-
1
-
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
-
4
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…Load management is the focus of research in both of the area in distributed Cloud Computing systems and centralized Cloud Computing systems. …”
Get full text
Thesis -
5
Dynamic load balancing policy with communication and computation elements in grid computing with multi-agent system integration
Published 2011“…The unique capabilities offered by multi-agent systems can be integrated or combined with the structure of dynamic load balancing to produce a better strategy and better load balancing algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Load balancing in 4G long term evolution / Marvin Hendary
Published 2013“…Thus, some method of load balancing is required. In this thesis, we propose a load balancing algorithm for a lightly loaded cell to initiate the handoff process, so that the lightly loaded cell can absorb some load of a heavily loaded cell. …”
Get full text
Get full text
Thesis -
7
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
10
-
11
-
12
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
13
-
14
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…In a conclusion, SEM prototype and adaptive communication data transfer algorithm with a combination of the three communication will be another method to solve a single communication problem of SM and suitable in residential location that offered the proposed communication infrastructure.…”
Get full text
Get full text
Thesis -
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
16
-
17
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
18
Dynamic load balancing policy in grid computing with multi-agent system integration
Published 2011“…The unique capabilities offered by multi-agent systems can be integrated or combined with the structure of dynamic load balancing to produce a better strategy to produce a better dynamic load balancing algorithm with multi-agent systems.…”
Get full text
Get full text
Conference or Workshop Item -
19
Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications
Published 2025“…The FOCS algorithm seeks to improve system performance through the reduction of latency, stabilization of energy consumption and communication costs. …”
Get full text
Get full text
Get full text
Thesis -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
