Search Results - (( using value based algorithm ) OR ( java application matching algorithm ))
Search alternatives:
-
1
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
2
Message based random variable length key encryption algorithm.
Published 2009“…A padding algorithm was used for small size messages or big random numbers. …”
Get full text
Get full text
Article -
3
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This research focuses on the Input-Output Based Relations (IOR) testing strategy, which optimizes the test suite size by selecting critical parameters and employing “don’t care” values for non-essential inputs. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Enhance key generation algorithm based user string identity as public key
Published 2015“…Only odd decimal values can be used in a public key using the Tripathi algorithm. …”
Get full text
Get full text
Thesis -
7
Enhanced Adaptive Confidence-Based Q Routing Algorithms For Network Traffic
Published 2004“…In CQ Routing Algorithm, the confidence value (C value) can be used to improve the quality of exploration in Q Routing Algorithm. …”
Get full text
Get full text
Thesis -
8
An adaptive routing algorithm: enhanced confidence-based Q routing algorithm in network traffic
Published 2004“…CQ Routing Algorithm evaluates how confidence value (C value) can be used to improve the quality of exploration in Q Routing Algorithm for adaptive packet routing in communication networks. …”
Get full text
Get full text
Get full text
Article -
9
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Four treatment plans are created and DVHs are evaluated based on criteria of acceptance level. NTCP values for thorax plan one and two are evaluated by using different algorithm. …”
Get full text
Get full text
Monograph -
10
Cuckoo search algorithm and wind driven optimization based study of satellite image segmentation for multilevel thresholding using Kapur’s entropy
Published 2014“…A new approach of CS and WDO algorithm is used for selection of optimal threshold value. …”
Get full text
Get full text
Article -
11
Modeling time series data using Genetic Algorithm based on Backpropagation Neural network
Published 2018“…This study showed the task of optimizing the topology structure and the parameter values (e.g., weights) used in the BPNN learning algorithm by using the GA. …”
Get full text
Get full text
Thesis -
12
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization. …”
Get full text
Get full text
Get full text
Monograph -
13
Study on numerical solution of a variable order fractional differential equation based on symmetric algorithm
Published 2019“…A fully symmetric classification of the boundary value problem for a class of fractional differential equations with variable sequences is determined by using a fully symmetric differential sequence sorting algorithm. …”
Get full text
Get full text
Get full text
Article -
14
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…A fuzzy system is a rule-based system that uses human expert's knowledge which holds the truth or false values to make a particular decision. …”
Get full text
Get full text
Thesis -
15
STUDIES ON COMPARISON OF PROPORTIONAL ON ERROR WITH PROPORTIONAL ON MEASURED VALUE IN PID CONTROLLERS
Published 2019“…Though, by increasing the value of Kc can improve the response for Proportional on PV algorithm to make it as having similar response with Proportional on Error algorithm that uses the original Kc. …”
Get full text
Get full text
Final Year Project -
16
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…Classifier algorithms, namely the Support Vector Machine and K-Nearest Neighbours were used for benchmarking the performance of the Real-Valued Negative Selection Algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A harmony search-based learning algorithm for epileptic seizure prediction
Published 2016“…The proposed harmony search-based learning algorithm is used in the task of epileptic seizure prediction. …”
Get full text
Get full text
Article -
19
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
20
Enhanced genetic algorithm optimization model for a single reservoir operation based on hydropower generation: case study of Mosul reservoir, northern Iraq
Published 2016“…In this case, the optimal values obtained from the GAOM were compared, firstly with their counterpart that found using the same algorithm without taking into consideration of Ev and Pr, secondly with the observed values. …”
Get full text
Get full text
Get full text
Article
