Search Results - (( usage evaluation path algorithm ) OR ( java application using algorithm ))
Search alternatives:
- usage evaluation »
- java application »
- evaluation path »
- using algorithm »
- path algorithm »
-
1
The impact of clustering on the average path length in wireless sensor networks
Published 2015“…This property is evaluated by comparing the performance of several clustering algorithms with respect to the average path length. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
A review on path collisions and resources usage in hybrid optical network on chip (HONoC)
Published 2015“…The purpose of this paper is to evaluate main problems in HONoC. From the evaluation, three main problems has been identified which are path collisions, low resource usage and high power consumption in HONoC.…”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Adaptable decentralized orchestration engine for block structured non-transactional workflow in service oriented architecture.
Published 2011“…Evaluations of the three adaptability aspects in the ADWEF demonstrate that the frequent-path adaptability greatly improves response-time, throughput, and bandwidth-usage of decentralized business processes. …”
Get full text
Get full text
Thesis -
5
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
6
-
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
A review on path collisions and resources usage in hybrid optical Network on Chip (HONoC)
Published 2023Conference Paper -
9
Ant-based vehicle congestion avoidance framework using vehicular networks / Mohammad Reza Jabbarpour Sattari
Published 2015“…Previous researches concentrated on using static algorithms to find the shortest path in VTRSs. However, providing a shortest path without considering other factors such as congestion, accidents, obstacles, travel time and speed is not a proper solution for vehicle traffic congestion problem. …”
Get full text
Get full text
Thesis -
10
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
12
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
15
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
16
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
-
18
Modelling and Optimization of Asymmetric Vehicle Routing Problem Using Particle Swarm Optimization Algorithm
Published 2021“…Specific optimization model and algorithm were developed to solve the problem. This intensive effort aims to reduce logistics costs and number of vehicle usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
Get full text
Get full text
Conference or Workshop Item
