Search Results - (( java location based algorithm ) OR ( parallel evaluation tool algorithm ))
Search alternatives:
-
1
A spark-based parallel fuzzy C median algorithm for web log big data
Published 2022“…Based on the Rand Index and SSE (sum of squared error), the parallel Fuzzy C median algorithm's performance is evaluated in the PySpark platform. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
A critical analysis of simulators in grid
Published 2015“…Out of this, the developers have spent remarkable efforts to come up with simulators which facilitate the studies in this domain.In addition, these simulators have a significant role in enhancing and proposing many scheduling algorithms, and this in turn has reflected efficiently on the Grid.In this paper, we will present some of these tools, which are: GridSim for large scales distributed computing and parallel environment, Alea for tackling dynamic scheduling problems, Sim-G-Batch grid simulator for simulating the security and energy concept and Balls simulator for evaluation peer-to-peer with integrated load balancing algorithm.Furthermore, this paper aims to guide and assist the researcher to choose the proper tool that can fit the studied research area, by providing functionality analysis for the reviewed simulators.…”
Get full text
Get full text
Get full text
Article -
3
The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data
Published 2024“…Therefore, we develop a Parallel Fuzzy C-Median Clustering Algorithm Using Spark for Big Data that can handle large datasets while maintaining high accuracy and scalability. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
5
Synchronous gravitational search algorithm vs asynchronous gravitational search algorithm: a statistical analysis
Published 2014Get full text
Get full text
Conference or Workshop Item -
6
-
7
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
8
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…The first step lies at the modelling of parallel applications running on heterogeneous parallel computers. …”
Get full text
Get full text
Thesis -
9
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
10
Parallel system for abnormal cell growth prediction based on fast numerical simulation
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
A new visual simulation tool for performance evaluation of MANET routing protocols
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
Automatic generic process migration system in linux
Published 2012“…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
Get full text
Get full text
Thesis -
15
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Projecting named entity tags from a resource rich language to a resource poor language
Published 2012“…The method computes the string similarity between the English words and the list of available lexemes in a pre-built lexicon that approximates the best NE mapping.The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure.An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Get full text
Article -
17
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Article -
18
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Article -
19
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Article -
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise
