Search Results - (( loading optimization window algorithm ) OR ( java application means algorithm ))
Search alternatives:
- loading optimization »
- application means »
- window algorithm »
- java application »
- means algorithm »
-
1
Worst-case latency analysis for AVB traffic under overlapping-based time-triggered windows in time-sensitive networks
Published 2022“…But worst-case AVB latency evaluation under overlapped TT windows is also essential for critical optimizations and tradeoffs. …”
Get full text
Get full text
Article -
2
Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks
Published 2022“…The second part proposes an optimized flexible window-overlapping scheduling (OFWOS) algorithm that optimizes the offset difference ( ) between the samepriority TT windows in the adjacent nodes. …”
Get full text
Get full text
Thesis -
3
-
4
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
-
6
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…The Genetic Algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System is also proposed based on general combinatorial optimization algorithm. …”
Get full text
Get full text
Thesis -
7
-
8
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
9
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…Generally, it can be said that two algorithms SPEA-II and NSGA-II perform better than other algorithms in terms of convergence to the optimal solution and diversity.…”
Get full text
Get full text
Thesis -
10
Numerical Modelling of the Electric Vehicle Cabin Cooling
Published 2019“…The model is validated for accuracy and it is found to have an average relative error of 15.11 %. The thermal load model is also incorporated into a cabin temperaturepredicting algorithm expansion. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
12
Analysis and decentralised optimal flow control of heterogeneous computer communication network models
Published 1993“…The principle of maximum entropy is used to derive new approximate solutions for the joint queue length distributions of multiclass general queueing network models with single server and multiserver and favourable comparisons with other methods are made. The decentralised optimal local flow control of the multiclass computer communication networks with single and multiple transmission links is shown to be a state dependent window type mechanism that has been traditionally used in practice. …”
Get full text
Get full text
Get full text
Thesis -
13
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
15
-
16
Traffic management algorithms for LEO satellite networks
Published 2016“…Those two algorithms are combined together due to the strong possibilities of being unable to achieve the optimal results when implemented separately. …”
Get full text
Get full text
Get full text
Thesis -
17
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
18
Mining Sequential Patterns Using I-PrefixSpan
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
20
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis
