Search Results - (( data evaluation window algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- evaluation window »
- window algorithm »
- java application »
- data evaluation »
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
2
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
3
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
4
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…Lately, a fully online buffer-based clustering algorithm for handling evolving data streams (BOCEDS) was developed. …”
Article -
5
Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm
Published 2016“…Crucial to this is the width of the sliding window. This study utilized raw data from network traffic and built a Neural Network (NN) model trained with the Cuckoo Search (CS) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…The algorithm development combines the frameworks from Phases 1 to 3, evaluating real and synthetic datasets. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
10
CC_TRS: continuous clustering of trajectory stream data based on micro cluster life
Published 2017“…For offline phase, a density based clustering approach is used to generate macro clusters depending on temporal micro clusters. The evaluation of the proposed algorithm on real data sets shows the efficiency and the effectiveness of the proposed algorithm and proved it is efficient alternative to time window technique.…”
Get full text
Get full text
Get full text
Article -
11
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The Windows malware dataset has been trained and tested by these three machine learning algorithms to get the percentage detection accuracy. …”
Get full text
Get full text
Student Project -
12
The Use and Evaluation of Split-Window Techniques for NOAA/AVHRR Surface Temperature Extraction over Different Surface Covers: case study (Perak Tengah & Manjong) area, Malays...
Published 2011“…The brightness temperature from bands 4&5 was then used with ε to derive Ts using three different split window algorithms. The results showed a good correlation between satellite estimated Ts and measured Ta especially when Uliveri algorithm was applied over the agricultural area with R reaching 87%. …”
Get full text
Get full text
Article -
13
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
14
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
Published 2024“…The use of the SHA-256 hash algorithm currently considered secure and resistant to collision attacks. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…However, it is a vital process for many applications such as traffic management, studying of animal behavior, and weather forecasting. Many existing algorithms for stream clustering of trajectory stream data exploit the time window technique which partition trajectory stream data into time-bins and cluster the segments in each timebin separately. …”
Get full text
Get full text
Thesis -
17
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
18
Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield
Published 2022“…Last but not least, the comparison of accuracy between frequency analysis algorithm and variable time window amplitude mapping (VTWAM) algorithm is performed. …”
Get full text
Get full text
Article -
19
-
20
A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh
Published 2019“…The voting-based hybrid approach consisting of various machine learning models with the ability to tackle issues related to missing and imbalanced data is then developed. To evaluate the efficacy of the models, publicly available financial and credit card data sets are evaluated. …”
Get full text
Get full text
Get full text
Thesis
