Search Results - (( based constructive method algorithm ) OR ( data virtualization based algorithm ))
Search alternatives:
- virtualization based »
- data virtualization »
- based constructive »
- method algorithm »
-
1
Resource scheduling algorithm with load balancing for cloud service provisioning
Published 2019“…The method constructs a Fuzzy-based Multidimensional Resource Scheduling model to obtain resource scheduling efficiency in cloud infrastructure. …”
Get full text
Get full text
Article -
2
Parameter Estimation of Lorenz Attractor: A Combined Deep Neural Network and K-Means Clustering Approach
Published 2022“…After that, it has been suggested to improve the efficiencies in the Deep Neural Network (DNN) model by combining the DNN with an unsupervised machine learning algorithm, the K-Means clustering algorithm. This study constructs the flow of DNN based method with the K-Means algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
3D solid robot animation design based on ADAMS
Published 2023“…In this paper, the BIOLOID robot assembly kit is used as the research platform. Based on this, the biped robot kinematics equations and dynamic equations are deduced, and a three-step programming method is used to carry out reasonable gait planning for the biped robot. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Study of Free Falling Particle in Viscous Fluid
Published 2016“…For example, mathematical computation or calculator, development of algorithmic equations, simulation, construction of virtual models and prototyping, analysis of data, exploration and visualization, visualization of graphics in the area of scientific and engineering aspects and also lastly the applications development such as the Graphical User Interface building. …”
Get full text
Get full text
Final Year Project -
5
-
6
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…Based on the proposed algorithms, energy consumption can be reduced…”
Get full text
Get full text
Get full text
Article -
7
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…The proposed HBAC algorithm was tested and compared with other stateof-the-art algorithms on 200 to 2000 even tasks by using CloudSim on standard workload format (SWF) data sets file size (200kb and 400kb). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
-
10
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
11
Enhancing hyperparameters of LSTM network models through genetic algorithm for virtual learning environment prediction
Published 2025“…Genetic algorithms for hyperparameter optimization significantly contributed, with the GA + LSTM + ADAGRAD model achieving 88% and 87% accuracy in the 7th and 9th models for BBB course data. …”
Get full text
Get full text
Get full text
Article -
12
Performance analysis of constrained device virtualization algorithm
Published 2020“…We have adopted this technique in our research to virtualize the entire Internet of Things network so that virtual TCP/IP based protocols can operate on virtual networks for enabling interoperability. …”
Get full text
Get full text
Get full text
Article -
13
Impatient job scheduling under cloud computing
Published 2012“…The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
14
-
15
An evolutionary based features construction methods for data summarization approach
Published 2015“…In this work, we empirically compare the predictive accuracies of classification tasks based on the proposed feature construction methods and also the existing feature construction methods. …”
Get full text
Get full text
Research Report -
16
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…As for this study, virtual area based is been used which applied to bathymetry data set that has been collected by using R2 Sonic 2020. …”
Get full text
Get full text
Thesis -
17
Energy efficient virtual machine provisioning in cloud data centers
Published 2014Get full text
Get full text
Conference or Workshop Item -
18
-
19
-
20
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Get full text
Article
