Search Results - (( after implementation towards algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  6. 6

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Autonomous path planning robot using geographical information by Ismail Ishaq Ibrahim

    Published 2008
    “…After the simulation using Matlab, the algorithm will then be implemented in the robot using basic stamp to run the mobile robot. …”
    Get full text
    Learning Object
  11. 11
  12. 12
  13. 13

    A Study Of Salting Method for Image Protection by Ahmad Faeez bin Lukman

    Published 2013
    “…This type of security method is implemented on the password that will be used to gain access to images stored in an online server, and after implemented supposedly the data will be secured and cannot be compromised by internet intruders or also known as hackers. …”
    Other
  14. 14
  15. 15

    Multi-objective optimisation of assembly line balancing type-e problem with resource constraints by Masitah, Jusop

    Published 2016
    “…The results indicate that NSGA-II has the ability to explore the search space and has better accuracy of solution towards Pareto-optimal front. The validation phase from the industrial case study concluded that the proposed methodology and algorithm can be implemented in industries. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Indoor Simultaneous Localization and Mapping (SLAM) Using Laser Range Finder by Hassan Eltayeb, Yassin Abdelrasoul

    Published 2016
    “…After that, the most appealing algorithms to the underlined objectives were further studied and technically compared. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. SecPath is evaluated with several variations using 400 nodes in WSN deployments as well as large-scale simulations. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. Energy efficient iPath (E-iPath) is evaluated with several variations of nodes in WSN deployments as well as large-scale simulations. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Leader follower pattern formation control using ros for mobile robot application by Ahmad Hakimi, Hasnan

    Published 2022
    “…ROS will be used to be the main system in controlling the hardware and also to create a virtual environment, generate robot model called Turlebot and implement the algorithms such as SLAM. ROS provides some convenient packages with ROS node and the SLAM algorithms that make the formation problem easier to solve. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    SENSORY EXPERT: DEVICE FOR SENSORY TEST by MOHD ADZMI, MOHD DANIAL AIMAN

    Published 2018
    “…The device is moving towards Internet of Things (IoT) where the compact sized and easy to carry device can be used to monitor the condition of patients’ heat nerves system before and after they are having their somatosensory treatment. …”
    Get full text
    Get full text
    Final Year Project