Search Results - (( developing agent detection algorithm ) OR ( java loading optimization algorithm ))

Refine Results
  1. 1

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…This research proposes an enhancement of the ant colony optimization algorithm that caters for dynamic scheduling and load balancing in the grid computing system. …”
    Get full text
    Get full text
    Get full text
    Monograph
  2. 2

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…This research proposes an Enhanced Ant Colony Optimization (EACO) algorithm that caters dynamic scheduling and load balancing in the grid computing system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection by Basheer G.S., Ahmad M.S., Tang A.Y.C.

    Published 2023
    “…The multi-agent system applies ant colony optimization and fuzzy logic search algorithms as tools to detecting learning styles. …”
    Conference Paper
  5. 5
  6. 6

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  7. 7

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi by Nur Fadzilah, Mohamad Radzi

    Published 2013
    “…Finally, the collision avoidance algorithm is verified through MATLAB software. Various cases are tested to demonstrate the robustness of both collision detection and avoidance algorithms.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli by Mohamad Nazli, Nur Amielia Natasha

    Published 2023
    “…The project utilizes the You Only Look Once (YOLO) algorithm as the detection algorithm, namely version 5. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Efficient and effective automated surveillance agents using kernel tricks by Ahmed, Tarem, Wei, Xianglin, Ahmed, Supriyo, Pathan, Al-Sakib Khan

    Published 2012
    “…In this paper we present three software-based agents built using kernel machines to perform automated, real-time intruder detection in surveillance systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH by AHMED ALI ALSHAKHSI, SAMEHA

    Published 2013
    “…If voice quality degradation is detected, then the agent performs further rate adaptation to improve the quality. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A modified digital hysteresis and artificial neural network (ANN) algorithms in single phase shunt active power filter control by Sabo, Aliyu, Abdul Wahab, Noor Izzri, Mohd Radzi, Mohd Amran, Mailah, Nashiren Farzilah, Abdul Rahman, Nor Farahaida

    Published 2014
    “…This paper introduces a new effective algorithms for the compensation of this ill effects in the power networks namely the digital hysteresis algorithm with a modification by bandwidth absence in the switching analysis (called bandless digital hysteresis algorithm) and a modified artificial neural network responsible to detect and generate the necessary compensation signal injected on to the power networks by the harmonic agents. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…It consists of a device database and two processing components: (1) device identification module and (2) device capabilities detection module. The content negotiation and adaptation architecture was implemented and validated through various laboratory experiments and field studies which the results highlight the importance of using token attributes matcher by eliminating the need of using the entire user agent strings for device identification and capabilities detection. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model by Kavindran, Suresh, Mohd Riduwan, Ghazali, Mohd Ashraf, Ahmad

    Published 2023
    “…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…Othman proposed a clustering algorithm named BTreeBicluster. The BTreeBicluster starts with the development of GO tree and enriching it with expression similarity from the Sacchromyces genes. …”
    Get full text
    Get full text
    Monograph