Search Results - (( web application bat algorithm ) OR ( _ application ((usage algorithm) OR (new algorithm)) ))*
Search alternatives:
- web application »
- application bat »
- usage algorithm »
- bat algorithm »
- new algorithm »
-
1
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. The result of the algorithm performance will be appeared in web application system. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Mining Of Resource Usage Using Evoc Algorithm In Grid Environment.
Published 2007Get full text
Get full text
Conference or Workshop Item -
3
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
4
-
5
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…The thesis also proposed a new scheduling algorithm (FWFQ) which suite the DiffServ architecture and it gives a better performance in terms of delay and jitter. …”
Get full text
Get full text
Thesis -
6
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
7
-
8
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
9
The tuning of error signal for back-propagation algorithms
Published 2008“…The ultimate outcome of the study would be handful information to get a better justification on these both Back-propagation algorithms usages in real application.…”
Get full text
Get full text
Get full text
Thesis -
10
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023Conference paper -
11
Resource Minimization in a Real-time Depth-map Processing System on FPGA
Published 2011Get full text
Get full text
Conference or Workshop Item -
12
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. The algorithms are DES, 3DES, Blowfish, Cast128 and RC5. …”
Get full text
Get full text
Conference or Workshop Item -
13
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
14
-
15
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
16
GENETIC ALGORITHM WITH DEEP NEURAL NETWORK SURROGATE FOR THE OPTIMIZATION OF ELECTROMAGNETIC STRUCTURE
Published 2020Get full text
Get full text
Final Year Project -
17
Applying case reuse and Rule-Based Reasoning (RBR) in object-oriented application framework documentation: Analysis and design
Published 2023Subjects:Conference Paper -
18
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
Get full text
Get full text
Get full text
Thesis -
19
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Implementing case-based reasoning approach to framework documentation
Published 2023Subjects:Conference paper
