Search Results - (( developing novel allocation algorithm ) OR ( java data function algorithm ))
Search alternatives:
- allocation algorithm »
- function algorithm »
- developing novel »
- novel allocation »
- data function »
- java »
-
1
A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network
Published 2015“…The novel algorithm has proven to be an effective scheduling technique for smart grid applications.…”
Get full text
Get full text
Get full text
Article -
2
An Improved Water-Filling Algorithm Based On Power Allocation In Network Mimo
Published 2020“…Moreover, this study focuses on the design and development of a novel power allocation algorithm, which is an extension to the previous Improved Water-Filling algorithm (IWF), namely, Low-Complexity Improved Water-Filling algorithm (LC-IWF). …”
Get full text
Get full text
Get full text
Article -
3
Development of a task-oriented, auction-based task allocation framework for a heterogeneous multirobot system
Published 2020“…The developed framework consists of a novel heuristic-based task allocation algorithm and communication module. …”
Get full text
Get full text
Get full text
Article -
4
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…The proposed algorithm has the ability to improve cloudlet allocation to meet the objective function. …”
Get full text
Get full text
Thesis -
6
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…The novel power allocation mechanism developed in this study demonstrates significant improvements. …”
Get full text
Get full text
Get full text
Thesis -
7
Joint optimization of resources allocation for quality of service aware next-generation heterogeneous cellular networks / Hayder Faeq Rasool Alhashimi
Published 2025“…The SARSA algorithm determines optimal power allocation that enhances EE by investigating different power levels. …”
Get full text
Get full text
Get full text
Thesis -
8
Optimal resource allocation for NOMA wireless networks
Published 2022“…As a result, in order to boost the system capacity, an efficient power allocation mechanism must be investigated. This research developed an efficient technique based on conjugate gradient to solve the problem of downlink power distribution. …”
Get full text
Get full text
Article -
9
Active load and loss allocation in transmission line via improved cuckoo search optimization technique / Nur Atiqah Abdul Rahman
Published 2014“…Thus, this research has proposed a novel technique to allocate both active load and losses in transmission line using a newly developed Improved Cuckoo Search (ICS) Optimization Technique. …”
Get full text
Get full text
Thesis -
10
Computational intelligence technique for DG installation within contingency scenario / Muhamad Saifullah Mahmud Affandi
Published 2014“…Distributed Generator (DG) had created a challenge and an opportunity for developing various novel technologies in power generation. …”
Get full text
Get full text
Get full text
Article -
11
Development Of Generative Computer-Aided Process Planning For Cnc Milling Parts_Pramodkumar S Kataraki
Published 2019“…The overall delta volume (ODV) is classified into SDVF, SDVT, SDVF filled region, SDV-VF, and SDVR. Algorithm is developed to auto-recognize surfaces of a milling part and auto-generate ODV. …”
Get full text
Get full text
Thesis -
12
Capacity planning for mixed-load tester under demand and testing time uncertainty
Published 2018“…Currently,the company’s issue is low tester utilization of about 71%,well below the target of 96%.The objective of this research is to improve tester utilization while achieving the production target under uncertain demand and testing time and also to determine the break-even point on the testers required.A novel approach of integrating a mathematical model,robust optimization model,genetic algorithm,simulation model and cost–volume –profit analysis was developed.Firstly,a mathematical model of mixed-load tester was formulated.Next,a set of discrete scenarios was proposed to address uncertain demand and testing time.A robust optimization and genetic algorithm model was developed to optimize the number of testers under the described uncertainties.Next,these scenarios were simulated using the Pro Model simulation software to validate the proposed models and to evaluate throughput and tester utilization.Finally,the cost–volume–profit analysis was performed for scenarios that require additional testers at various levels of uncertainties.The results showed that the proposed solution improved tester utilization by 25% compared to the current system.This research has contribution by developing novel hybrid methodology and able to provide useful insights to assist company’s managers to plan and allocate resources according to variations in customers’ demands and testing time.…”
Get full text
Get full text
Get full text
Thesis -
13
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Embedded Meta evolutionary-firefly algorithm-ANN for multi dg planning in distribution system / Siti Rafidah Abdul Rahim
Published 2019“…This thesis presents a novel Embedded Meta Evolutionary–Firefly Algorithm-Artificial Neural Network for Multi-DG planning in distribution system. …”
Get full text
Get full text
Thesis -
15
A smart spectrum access technique for dynamic multi-hop routing in cognitive radio-based disaster response networks
Published 2022“…The allocation of the spectrum during emergencies is a challenging task, which is not yet solved. …”
Get full text
Get full text
Get full text
Thesis -
16
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
17
Malaysian menu planning model using Self-adaptive Hybrid Genetic Algorithm (SHGA)
Published 2018“…We developed Malaysian menu planning model with the objectives to optimize the budget allocation for each student, maximize the variety of daily meals, maximize the caterer’s ability, accomplish meals course structures and fulfill the standard recommended nutrient intake (RNI). …”
Get full text
Get full text
Article -
18
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
19
Malaysian menu planning model using Self-Adaptive Hybrid Genetic Algorithm (SHGA)
Published 2018“…We developed Malaysian menu planning model with the objectives to optimize the budget allocation for each student, maximize the variety of daily meals, maximize the caterer’s ability, accomplish meals course structures and fulfill the standard recommended nutrient intake (RNI). …”
Get full text
Get full text
Get full text
Article -
20
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article
