Search Results - (( program sharing using algorithm ) OR ( java adaptation optimization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Peer to Peer Video Streaming Application by Shafri, Muhammad llham Faez

    Published 2008
    “…The program will be done using Java enviromnent and its algorithms. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Parallel matrix-multiplication algorithm on network of workstations by Md. Aminuddin, Rusdi, Abdullah, Rosni, Hassan, Suhaidi

    Published 2004
    “…Although programming in such environment is relatively harder compared to that of in shared memory multiprocessing environment, its advantages outweigh its complexity. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    The initial investigation of the design and energy sharing algorithm using two-ways communication mechanism for Swarm Robotic System by Ismail, Amelia Ritahani, Desia, Recky, Zuhri, Muhammad Fuad Riza

    Published 2015
    “…This paper is therefore will describe our initial investigation on the design and the implementation of energy sharing algorithm using two-ways robotic swarm communication mechanism with NRF2401.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems by Sinnanaidu, Subba Rao

    Published 2004
    “…The “reputation sharing” based on a distributed polling iv algorithm in which the resource requestors can assess the reliability of respective provider before initiating the download. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Campus study buddy : collaborative learning and resource sharing app by Huang, Yifan

    Published 2024
    “…Higher education institutions can use this program to provide students with a platform to collaborate and support each other's learning, creating a collaborative learning environment, promoting knowledge sharing, and improving student academic success. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Security analysis of data transmission in an IoT based platform for telemedicine by Olanrewaju, Rashidah Funke, Amuda, Idowu Rahaman, Hassan Abdalla Hashim, Aisha

    Published 2021
    “…One of the algorithms that is commonly used due to its exemplary security and use in extensive applications is the advanced encryption standard (AES) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Unit Kesihatan UiTM (Perak) appointment scheduling system using Genetic Algorithm (GA) / Nur Amiera Abdul Rahman by Abdul Rahman, Nur Amiera

    Published 2014
    “…Alhamdulillah, my heartfelt thanks and gratitude to Allah SWT, that he was willing to give a chance with the good health and leisure time to complete this final year project proposal titled Unit Kesihatan UiTM (Perak) Appointment Scheduling System Using Genetic Algorithm (GA). The final year project has been properly drawn for Universiti Teknologi Mara (UiTM), basically for the students to complete the degree program leading to a Bachelor of Science (Hons) in Computer Science. …”
    Get full text
    Get full text
    Thesis