Search Results - (( developing emerging classification algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- emerging classification »
- developing emerging »
- java simulation »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
2
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
3
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
4
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
5
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024Proceedings Paper -
6
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
7
The Bacterial Foraging Optimisation Algorithm using Prototype Selection and Prototype Generation for Data Classification
Published 2020“…Therefore, we conclude that the proposed BFOA-G is the best algorithm in the study, and PG approach is recommended for further development of BFOA as an IS algorithm.…”
Get full text
Get full text
Get full text
Thesis -
8
The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques
Published 2016“…In this study, a tracking algorithm is developed by means of image processing technique in detecting ambulance. …”
Get full text
Get full text
Thesis -
9
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
11
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
12
Traffic monitoring system with emergency support using SOM
Published 2020“…Several processes will implement such pre-processing, as well as feature extraction, for better classification and localization process. In the classification section, all the processed parameters are input into the classification algorithm to classify the groups to which the input parameters belong. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…Unlike the classical kNN algorithm which is a regression type algorithm, the proposed localisation algorithms utilise machine learning classification for both linear and kernel types. …”
Get full text
Get full text
Thesis -
14
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
15
-
16
A review on classifying and prioritizing user review-based software requirements
Published 2024“…Investigating the potential of emerging machine learning models and algorithms to improve classification and prioritization accuracy is crucial. …”
Get full text
Get full text
Get full text
Article -
17
Development of a wearable human fall detection system
Published 2022“…In this study, an accelerometer and gyroscope sensors were installed in a wearable fall detector. A fall detection algorithm was developed using MATLAB. This algorithm will extract features from the signal sent by the sensors and conduct a series of decision-making and classification process to determine whether a fall has actually occurred. …”
Get full text
Get full text
Article -
18
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
Get full text
Get full text
Get full text
Article -
19
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies. …”
Article -
20
