Search Results - (( using scheme based algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- java application »
- using scheme »
- scheme based »
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
2
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
3
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
4
-
5
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
6
-
7
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
8
-
9
Quality of service management algorithms in WiMAX networks
Published 2015“…This scheme determines an admission criteria based on scheduling service classes. …”
Get full text
Get full text
Thesis -
10
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…In the proposed HATSC scheme, the AHP method is uese for criteria weighting, while the TOPSIS method uses for the selection technique based on a multi-criteria decision-making algorithm is proposed. …”
Get full text
Get full text
Thesis -
11
-
12
Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS
Published 2014“…In addition, the ICA-based scheme also indicates promising convergence and time running performance as compared to other schemes.…”
Get full text
Get full text
Conference or Workshop Item -
13
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…A secure hybrid scheme introduces a new design architecture of the symmetric AES algorithm to encrypt the MQTT payload called “D-AES”. …”
Get full text
Get full text
Thesis -
14
Application Of Higher Order Compact Finite Difference Methods To Problems In Fluid Dynamics
Published 2003“…Third, only the numerical algorithm based on Hermitian scheme is used to solve the flow past a backward-facing step. …”
Get full text
Get full text
Thesis -
15
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
16
A reinforcement learning-based energy-efficient spectrum-aware clustering algorithm for cognitive radio wireless sensor network
Published 2016“…Performance comparisons of the RL based clustering scheme with Groupwise spectrum-aware clustering scheme show that an energy savings of9% and PU detection performance improvement of 11.6% can be achieved. …”
Get full text
Get full text
Thesis -
17
-
18
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
19
Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network
Published 2014“…The forward and backward secrecy of the proposed scheme has been extensively validated by formal method using rank theorem. …”
Get full text
Get full text
Get full text
Article -
20
Post quantum signature schemes for the block chain technology
Published 2019“…First we study the different properties and uses of signature schemes, and how Elliptic Curve Digital Signature Algorithm is used in the blockchain technology. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
