Search Results - (( parameter information sharing algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- parameter information »
- information sharing »
- sharing algorithm »
- java application »
-
1
Price discovery in bitcoin spot or futures during the Covid-19 pandemic? evidence from the time-varying parameter vector autoregressive model with stochastic volatility
Published 2022“…This paper examines price discovery between bitcoin spot and futures using static measures, namely information share (IS), component share (CS), modified information share (MIS), information leadership share (ILS), impulse response, and a time-varying parameter vector autoregressive (TVP-VAR) model with stochastic volatility and Markov Chain Monte Carlo (MCMC) sampling algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
3
Meta-scheduler in Grid environment with multiple objectives by using genetic algorithm
Published 2006“…Such flexible resource request could offer the opportunity to optimize several parameters, such as coordinated resource sharing among dynamic collections of individuals, institutions, and resources. …”
Get full text
Article -
4
Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems
Published 2020“…The reference point is determined by the decision maker to guide the search process to a particular region in the true Pareto front. However, HHMO algorithm produces a poor approximation to the Pareto front because lack of information sharing in its population update strategy, equal division of convergence parameter and randomly generated initial population. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
6
-
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System
Published 2013“…The fruit flies or Drosophila Melanogaster movement strategy offers some advantages such as strategic 'search-aggregation' cycle, distribution of moving patterns with Levy Random, information sharing in real-time, and reduction of controller parameters during movements. …”
Get full text
Get full text
Thesis -
9
Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
Published 2011“…They have the promising potential of being the basis of authentication mechanisms for Mobile IPv6 because they do not require hosts to share information or security infrastructure. A mobile environment however has several resource constraints that must be considered before any mechanism can be deemed feasible. …”
Get full text
Get full text
Get full text
Article -
10
An adaptively switching iteration strategy for population based metaheuristics / Nor Azlina Ab. Aziz
Published 2017“…In asynchronous update, the procedures are executed as individual tasks and information is shared and used to guide the search for the optimal solution. …”
Get full text
Get full text
Get full text
Thesis -
11
Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation
Published 2019“…The final operation involves the mobile node sharing the current information with its neighbours’ nodes based on its current location. …”
Get full text
Get full text
Thesis -
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Efficient multi-UAV coordination via rl: joint path planning and task scheduling for post-disaster UAV-assisted MEC systems
Published 2025“…Meanwhile, task scheduling is optimized using a greedy algorithm to reduce computational complexity, and UAVs cooperate through information sharing to achieve robust performance. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
HABC: Hybrid artificial bee colony for generating variable T-way test sets
Published 2020“…PSO was integrated as the exploitation agent for the ABC hence the hybrid nature. The information sharing ability of PSO via the Weight Factor is used to enhance the performance of ABC. …”
Get full text
Get full text
Article -
16
HABC: Hybrid artificial bee colony for generating variable T-way test sets
Published 2020“…PSO was integrated as the exploitation agent for the ABC hence the hybrid nature. The information sharing ability of PSO via the Weight Factor is used to enhance the performance of ABC. …”
Get full text
Get full text
Article -
17
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…It is evident from the result that the proposed algorithm able to produced better result.…”
Get full text
Get full text
Thesis -
18
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…This study suggests the work to combine the optimization of feature selection and algorithm parameters to achieve higher accuracy and acquire more reliable comparison.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A hybrid cryptosystem for biometric authentication and template protection
Published 2017“…Existing hybrid cryptosystems rely on the secrecy of user-specific parameter and the complexity of template protection algorithms, but do not guarantee template security, user privacy and identity protection once the constituent template protection schemes are compromised. …”
Get full text
Get full text
Thesis -
20
Improving multi-resident activity recognition in smart home using multi label classification with adaptive profiling
Published 2018“…Therefore, Adaptive Profiling (AP) for multi-resident involving context information includes temporal and spatial information is proposed to address the class-overlapping using Expectation-Maximization (EM) clustering. …”
Get full text
Get full text
Thesis
