Search Results - (( a constructive method algorithm ) OR ( data virtualization based algorithm ))
Search alternatives:
- virtualization based »
- data virtualization »
- method algorithm »
- a constructive »
-
1
Resource scheduling algorithm with load balancing for cloud service provisioning
Published 2019“…The method constructs a Fuzzy-based Multidimensional Resource Scheduling model to obtain resource scheduling efficiency in cloud infrastructure. …”
Get full text
Get full text
Article -
2
Parameter Estimation of Lorenz Attractor: A Combined Deep Neural Network and K-Means Clustering Approach
Published 2022“…This study constructs the flow of DNN based method with the K-Means algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
3D solid robot animation design based on ADAMS
Published 2023“…The feasibility of gait planning is verified by analyzing the dynamic images obtained from the simulation experiments and the experimental data of each joint vector. This paper uses the Denavit-Hartenberg rule to construct a biped robot animation simulation kinematics model, deduces a matrix expression describing joint vectors between adjacent links, and solves the biped robot’s positive kinematics equation by chain multiplication rule; An efficient and improved inverse kinematics algorithm is proposed. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Study of Free Falling Particle in Viscous Fluid
Published 2016“…It has a vast application in our daily life. For example, mathematical computation or calculator, development of algorithmic equations, simulation, construction of virtual models and prototyping, analysis of data, exploration and visualization, visualization of graphics in the area of scientific and engineering aspects and also lastly the applications development such as the Graphical User Interface building. …”
Get full text
Get full text
Final Year Project -
5
-
6
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…Based on the proposed algorithms, energy consumption can be reduced…”
Get full text
Get full text
Get full text
Article -
7
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…The proposed HBAC algorithm was tested and compared with other stateof-the-art algorithms on 200 to 2000 even tasks by using CloudSim on standard workload format (SWF) data sets file size (200kb and 400kb). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
-
10
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
11
Enhancing hyperparameters of LSTM network models through genetic algorithm for virtual learning environment prediction
Published 2025“…Genetic algorithms for hyperparameter optimization significantly contributed, with the GA + LSTM + ADAGRAD model achieving 88% and 87% accuracy in the 7th and 9th models for BBB course data. …”
Get full text
Get full text
Get full text
Article -
12
Performance analysis of constrained device virtualization algorithm
Published 2020“…We have adopted this technique in our research to virtualize the entire Internet of Things network so that virtual TCP/IP based protocols can operate on virtual networks for enabling interoperability. …”
Get full text
Get full text
Get full text
Article -
13
Impatient job scheduling under cloud computing
Published 2012“…The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
14
-
15
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…As for this study, virtual area based is been used which applied to bathymetry data set that has been collected by using R2 Sonic 2020. …”
Get full text
Get full text
Thesis -
16
Energy efficient virtual machine provisioning in cloud data centers
Published 2014Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Get full text
Article -
20
Finger triggered virtual musical instruments
Published 2013“…The musical notes recognition system matches the received triggering signal data with the predefined musical notes data using matching algorithm. …”
Get full text
Get full text
Get full text
Article
