Search Results - (( using codification using algorithm ) OR ( data application a algorithm ))
Search alternatives:
- using codification »
- codification using »
- data application »
- using algorithm »
- application a »
- a algorithm »
-
1
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
2
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…Eventually, the workflow is executed. The second algorithm is a variation in first algorithm in which data parallelism is introduced in each partition. …”
Get full text
Get full text
Get full text
Thesis -
3
Development of decentralized data fusion algorithm with optimized kalman filter.
Published 2016“…This thesis proposes a data fusion model that facilitates selection of algorithm and recommends selected algorithm to be optimized. …”
Get full text
Get full text
Thesis -
4
Development of heuristic task scheduling algorithm in cloud computing
Published 2016“…To this direction, in this paper we make a summary of some scheduling algorithms and propose an Enhanced Greedy Heuristic Scheduling Algorithm (EGHSA) for task scheduling adapted for big data applications. …”
Get full text
Get full text
Proceeding Paper -
5
A study of density-grid based clustering algorithms on data streams
Published 2011Get full text
Get full text
Conference or Workshop Item -
6
Data discovery algorithm for scientific data grid environment
Published 2005“…By using this model, we study various discovery algorithms for locating data sets in a data grid system. …”
Get full text
Get full text
Get full text
Article -
7
On density-based data streams clustering algorithms: A survey
Published 2017“…Recently, a lot of density-based clustering algorithms are extended for data streams. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
9
Application of the bees algorithm to the selection features for manufacturing data
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm
Published 2020“…With the emergence of big data, the performance and the efficiency of the traditional k-NN algorithm is fast becoming a critical issue. …”
Get full text
Get full text
Article -
11
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm
Published 2020“…With the emergence of big data, the performance and the efficiency of the traditional k-NN algorithm is fast becoming a critical issue. …”
Get full text
Get full text
Article -
12
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…This is due to the cryptography operations that include the HMAC and symmetric encryptions. The thesis proposes a new algorithm that provides a significant performance gain in bulk data transfer without compromising the security. …”
Get full text
Get full text
Thesis -
13
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm requires two inputs for it to be applied onto a data set, the value K, and a proximity measure. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman
Published 2013“…Six Y-STR data sets were used as a benchmark to evaluate the performances of the algorithm against the other eight partitional clustering algorithms. …”
Get full text
Get full text
Thesis -
15
-
16
Fatigue data editing algorithm for automotive applications
Published 2005“…The accuracy of the algorithm has been evaluated by application to two experimentally measured data sets containing tensile and compressive preloading conditions. …”
Get full text
Get full text
Article -
17
Enhanced divide-and-conquer algorithm with 2-block policy
Published 2000Get full text
Get full text
Get full text
Article -
18
-
19
-
20
