Search Results - (( program sharing process algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- process algorithm »
- java application »
- during algorithm »
- program sharing »
- sharing process »
-
1
-
2
Hybrid scheduling and dual queue scheduling
Published 2009“…Efficient resource utilization is achieved by sharing system resources amongst multiple users and system processes. …”
Get full text
Get full text
Conference or Workshop Item -
3
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
4
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…In Round Robin scheduling, processes get fair share of quantum time of the Central Processing Unit. …”
Get full text
Get full text
Thesis -
5
Hybrid scheduling and dual queue scheduling
Published 2009“…Efficient resource utilization is achieved by sharing system resources amongst multiple users and system processes. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
7
-
8
-
9
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The calculation during the encryption and decryption process will be handled using Python programming. …”
Get full text
Get full text
Student Project -
10
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
12
Investigating The Performance Of Metaheuristics To Optimize The Revenue Of Semiconductor Supply Chain
Published 2022“…Below is the comparison of the fitness value among 20 metaheuristics algorithms run through Python programming.…”
Get full text
Get full text
Monograph -
13
An efficient method for audio watermarking using SWT and mean value quantization
Published 2016“…Digital watermarking has been capturing the interests in programming society several decades ago due to the development of software and programming techniques that cause an increase in illegal use of digital files. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Identifying The Ethical Issues In Twitter: A Knowledge Acquisition For Ontology
Published 2024“…Out of many other social networking sites, Twitter has been identified as one of the most popular microblogging social networking platforms. Using a simple algorithm in R programming and 43 keywords based on Ibn Khaldun’s thoughts, 1075 public tweets have been extracted from Twitter as a sample of ethical issues. …”
Article -
17
-
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The image processing algorithm includes color space conversion and motion analysis technique. …”
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
