Search Results - (( developing mobile modified algorithm ) OR ( java loading optimization algorithm ))

Refine Results
  1. 1

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…This research proposes an enhancement of the ant colony optimization algorithm that caters for dynamic scheduling and load balancing in the grid computing system. …”
    Get full text
    Get full text
    Get full text
    Monograph
  2. 2

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…This research proposes an Enhanced Ant Colony Optimization (EACO) algorithm that caters dynamic scheduling and load balancing in the grid computing system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles by Abdulhasan Al-Jarah, Ali Husam

    Published 2017
    “…So, the travelling distance, power consumption and lifetime of the network will be calculated in both cases for original algorithm and modified algorithm, which is a modified deployment algorithm, and compared between them. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Comparison of path planning in simulated robot by Ch’ng, Chee Yu’ng

    Published 2020
    “…There are 4 path planning algorithms will be compared, which are Dijkstra’s algorithm, A* algorithm, RapidExploring Random Tree (RRT) algorithm, and the last one is an algorithm modified from A*. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    A framework of modified adaptive neuro-fuzzy inference engine by Hossen, Md. Jakir

    Published 2012
    “…The Takagi-Sugeno-Kang (TSK) type fuzzy inference system was chosen and constructed by an automatic generation of clusters as well as membership functions and minimal rules through the use of hybrid fuzzy clustering and the modified apriori algorithms respectively. The developed TSK type fuzzy inference engine is called modified adaptive fuzzy inference engine (MAFIE) and its parameters were then adjusted by the hybrid learning algorithm using adaptive neural network architecture towards improved performance which is called MANFIE. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm by Arezoumand, Reza

    Published 2015
    “…One of the solutions to this problem is by using mobile robots with concern on exploration algorithm for mobile robot. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Speech enhancement using deep neural network based on mask estimation and harmonic regeneration noise reduction for single channel microphone by Md Jamal, Norezmi

    Published 2022
    “…The development of speech-enabled mobile applications has greatly improved human-computer interaction in recent years. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Design and evaluation on adaptive fuzzy speed control of mobile robot by Abdollahi, Mohammadreza

    Published 2011
    “…Both data acquisition and control algorithm are developed by using LabVIEW. A four-wheel mobile robot, PUTRABOT2, is used to conduct the experiments. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A green clustering protocol for mobile sensor network using particle swarm optimization by Latiff, N.M.A., NikAbdMalik, N., Latiff, A.H.A.

    Published 2016
    “…In this paper, we propose a green clustering protocol for mobile sensor networks using particle swarm optimization (PSO) algorithm. …”
    Get full text
    Get full text
    Article
  15. 15

    A green clustering protocol for mobile sensor network using particle swarm optimization by Latiff, N.M.A., NikAbdMalik, N., Latiff, A.H.A.

    Published 2016
    “…In this paper, we propose a green clustering protocol for mobile sensor networks using particle swarm optimization (PSO) algorithm. …”
    Get full text
    Get full text
    Article
  16. 16

    DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM by YVONNE, PHUA YEE WUN

    Published 2022
    “…The second approach applies deep learning methods with three different convolution neural network models, which are modified LeNet-5, MobileNet-V2, and DenseNet-201 to detect drowsiness. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  17. 17

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…In this thesis the ad hoc routing protocol AODV is used and modified to examine the interconnection between a mobile ad hoc network and the Internet. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks by Ghathwan, Khalil Ibrahim

    Published 2016
    “…The new method is called the Daddy Long-Legs Algorithm (PGO-DLLA), which modifies the standard AODV and optimizes the routing process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20