Search Results - (( developing based cp algorithm ) OR ( java implication force algorithm ))

Refine Results
  1. 1
  2. 2

    Cloud Resource Management Framework Using Monarch Butterfly Harmony Search And Case Based Reasoning by Ahmed Mohamed Ghetas, Mohamed Rezk

    Published 2017
    “…In addition, a new ri is developed using case-based reasoning and is then plugged into the rop framework. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Fault location in unbalanced distribution system including distributed generation units using multi-layer feed forward neural network by Farzan, Payam

    Published 2014
    “…Fault location finding process in distribution network is totally different based on the application of developed algorithms for the transmission lines due to characteristics of distribution system. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Scalable workflow scheduling algorithm for minimizing makespan and failure probability by Abdul Aziz, Maslina, Ninggal, Izuan Hafez

    Published 2019
    “…Based on the simulation results, the proposed algorithm has improved the overall workflow scheduling effectiveness in comparison with existing algorithms.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Some Metaheuristics for Tourist Trip Design Problem by Son, N.T., Nguyet Ha, T.T., Jaafar, J.B., Anh, B.N., Giang, T.T.

    Published 2023
    “…We also compared the proposed method with the Posteriority approach to MOP. The results show that CP-based algorithms are superior to NSGA-II in finding a Pareto frontier. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Fault detection and diagnosis using correlation coefficients by Mak, Weng Yee

    Published 2005
    “…This research is to formulate a FDD algorithm based on MSPC via correlation coefficients. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Nonlinear convergence algorithm: structural properties with doubly stochastic quadratic operators for multi-agent systems by Abdulghafor, Rawad Abdulkhaleq Abdulmolla, Turaev, Sherzod, Zeki, Akram M., Adamu, Abubakar Ibrahim

    Published 2018
    “…We develop two algorithms: 1) the nonlinear algorithm of extreme doubly stochastic quadratic operator (NLAEDSQO) to generate all the convergent EDSQOs and 2) the nonlinear convergence algorithm (NLCA) of EDSQOs to investigate the optimal consensus for MAS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…Thirdly, an authorization algorithm named federated proxy implements for fine-grained access control based on CP-ABE (FPI-CP-ABE) is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    T-way strategy for sequence input interactions test case generation adopting fish swarm algorithm by Rahman, Mostafijur, Sultana, Dalia, Sabira, Khatun, M. F. M., Jusof, Syamimi Mardiah, Shaharum, Nurhafizah, Abu Talip Yusof, Qaiduzzaman, Khandker M., Hasan, Md. Hasibul, Rahman, Md. Mushfiqur, Hossen, Md. Anwar, Begum, Afsana

    Published 2019
    “…Since twenty years many useful t-way strategies have been developed to reduce test case size. In order to reduce test cases several T-way sequence input interaction strategies are explored, such as, Bee Algorithm(BA), Kuhn encoding (K) , ASP with Clasp , CP with Sugar, Erdem (ER) exact encoding, Tarui (TA) Method, U, UR, D and DR, Brain (BR). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Feedforward neural network for solving particular fractional differential equations by Admon, Mohd Rashid

    Published 2024
    “…Then, a single hidden layer of FNN based on Chelyshkov polynomials with an extreme learning machine algorithm (SHLFNNCP-ELM) is constructed for solving FDEsC. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis by Mohamed Elfaki, Faiz Ahmed

    Published 2004
    “…The Expectation Maximization (EM) algorithm is utilized to obtain the estimate of the parameters in the models. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…Some schemes have been proposed to deliver such access control using Ciphertext-policy attribute-based encryption (CP-ABE) that can enforce data owners’ access policies to achieve such cryptographic access control and tackle the majority of those concerns. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Prediction of meteorological drought and standardized precipitation index based on the random forest (RF), random tree (RT), and Gaussian process regression (GPR) models by Elbeltagi A., Pande C.B., Kumar M., Tolche A.D., Singh S.K., Kumar A., Vishwakarma D.K.

    Published 2024
    “…A different combination of machine learning models and variables has been performed for the forecasting of metrological drought based on the SPI-6 and 12�months. Models were developed using monthly rainfall data for the period of 2000�2019 at two meteorological stations, namely, Karanjali and Gangawdi, each representing a geographical region of Upper Godavari river basin area in the central India of Maharashtra state which frequently experiences droughts. …”
    Article