Search Results - (( develop reading optimization algorithm ) OR ( java optimization model algorithm ))

Refine Results
  1. 1

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    The optimization of resources allocation to minimize energy consumption within data center in cloud by Ayob, Fahrul Hakim, Jayatis, Punaya, Subramaniam, Shamala

    Published 2019
    “…The advantages of these services are extremely significant, but the data centers that offer this kind of service are suffering from over power consumption that impose serious threats to the environment due to the emission of carbon dioxide to the atmosphere.Because of some disadvantages in Dynamic Voltage Frequency Scheduling (DVFS), this paper proposes a cloud scheduling algorithm adapted from Dynamic Resource Allocation Method (DRA) to be developed with the goal of dynamically virtual machines (VMs) migration when resource utilization reaches above or below threshold readings in order to optimize the power consumption towards energy saving in cloud data center. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Hybridized firefly algorithm for multi-objective radio frequency identification (RFID) network planning by Elewe, Adel Muhsin, Hasnan, Khalid, Nawawi, Azli

    Published 2017
    “…A novel approach of hybrid firefly algorithm was developed for multi-objective RNP problem. …”
    Get full text
    Get full text
    Article
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Improved elitist genetic algorithm for reactive power planning in power system / Mohamad Fadhil Mohd Kamal by Mohd Kamal, Mohamad Fadhil

    Published 2010
    “…The study adopts the reading produced by the EGA as the benchmark for drawing any judgment towards developing the improved EGA.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13
  14. 14
  15. 15

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Neuro-Fuzzy and Particle Swarm Optimization based Model for the Steam and Cooling sections of a Cogeneration and Cooling Plant by Alemu Lemma, Tamiru, Rangkuti, Chalillullah, Mohd Hashim, Fakhruldin

    Published 2009
    “…Neuro-fuzzy approach trained by a sequence of optimization algorithms-Particle Swarm Optimization (PSO) followed by Back-Propagation (BP)-is used to develop models for the steam drum pressure, steam drum water level, steam flow rate and chilled water supply temperature. …”
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Thesis