Search Results - (( developing bubble detection algorithm ) OR ( java loading optimization algorithm ))
Search alternatives:
- loading optimization »
- developing bubble »
- java »
-
1
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…This research proposes an enhancement of the ant colony optimization algorithm that caters for dynamic scheduling and load balancing in the grid computing system. …”
Get full text
Get full text
Get full text
Monograph -
2
-
3
Charge coupled device based on optical tomography system in detecting air bubbles in crystal clear water
Published 2024“…Experiments in detecting moving air bubbles are conducted. The images of captured data are reconstructed based on filtered image of Linear Back Projection with Hybrid algorithms. …”
Article -
4
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…This research proposes an Enhanced Ant Colony Optimization (EACO) algorithm that caters dynamic scheduling and load balancing in the grid computing system. …”
Get full text
Get full text
Get full text
Thesis -
5
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
6
Shape-Based Matching: Application of Defect Detection
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
8
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…Also, the algorithm for subsequent implementation of the selective adaptive bubble burst mitigation mechanism was presented. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. …”
Get full text
Get full text
Thesis -
10
Charge-coupled device based on optical tomography system in detecting solid and transparent objects in non-flowing crystal clear water
Published 2024“…Experiments in detecting static solid, transparent objects and moving air bubbles are conducted. …”
Article -
11
Charge-coupled device based on optical tomography system in detecting solid and transparent objects in non-flowing crystal clear water
Published 2024journal::journal article -
12
Initial study of invasive approach of electrical capacitance tomography for identifying non-conducting medium in steel pipe application
Published 2021“…In short, the invasive approach for ECT is seen to be possible to apply for oil-gas application in steel pipe. The LBP algorithm with the average MSSIM value around 0.3 was able to detect the oil-gas regime inside the steel pipe.…”
Get full text
Get full text
Get full text
Article -
13
Initial Study of Invasive Approach of Electrical Capacitance Tomography for Identifying Non-Conducting Medium in Steel Pipe Application
Published 2024journal::journal article
