Search Results - (( developing mobile ad algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks by Alahdal, Tariq A. A.

    Published 2008
    “…Mobile ad hoc network is a collection of mobile nodes forming dynamic and temporary network. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A dynamic energy savvy routing algorithm for mobile Ad-hoc and sensor networks by Mohamad Nazim, Jambli, Adnan Shahid, Khan, Halikul, Lenando, Jiwa, Abdullah, Sinarwati, Mohamad Suhaili

    Published 2017
    “…Mobile Ad-hoc and Sensor Networks (MASNETs) are energy constrained networks which have been the focus of many recent research and development efforts. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…This evaluation is done by means of simulation using NS-2 developed by University California Berkeley. There are several ad hoc routing protocols, such as AODV, DSR, and DSDV that propose solutions for routing within a mobile ad hoc network. …”
    Get full text
    Get full text
    Thesis
  7. 7

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  8. 8

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…Abstract Mobile Ad hoc networks (MANETs) are susceptible to several types of attacks due to their open medium, lack of centralized monitoring and management point, dynamic topology and other features. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Mobile game application development using evolutionary algorithms by Ong, Jia Hui

    Published 2014
    “…Hence it has opened up a whole new market with its mass among users and attracted a large number of smartphone application developers. Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Mobile Ad hoc NETwork (MANET) is a set of wireless mobile nodes temporary connected without existing network infrastructure or centralized administrations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Mobile student study planner by Chai, Jia Yuan

    Published 2020
    “…Therefore, this project entitled “Mobile Student Study Planner” is to implement a study planner as a mobile application with some added features as compared to the existing applications in the marketplace. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks by Ghathwan, Khalil Ibrahim

    Published 2016
    “…Mobile ad hoc networks (MANETs) are wireless networks that are subject to severe attacks, such as the black hole attack. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Performance evaluation of mobile ad hoc network in wireless LAN / Norfadhilah Hasan by Hasan, Norfadhilah

    Published 2005
    “…Mobile Ad-hoc Network (MANET) is becoming increasingly important in today's world and a number of protocols have been developed for them. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Mobile cookbook application with searching by ingredients / Falihah Mamat @ Mohammad by Mamat @ Mohammad, Falihah

    Published 2015
    “…Frustrating things when preparing a meal is forgetting the key ingredients.Through this project, a cookbook mobile application will be developed using agile framework. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method by Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, Alghushami, Abdullah H., Alani, Sammer

    Published 2019
    “…Security is a critical problem in implementing mobile ad hoc networks (MANETs) because of their vulnerability to routing attacks. …”
    Get full text
    Get full text
    Get full text
    Book Chapter