Search Results - (( developing scale efficiency algorithm ) OR ( java validation using algorithm ))

Refine Results
  1. 1

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Efficient Genetic Algorithm for Large Scale Vehicle Routing Problem Subject to Precedence Constraints by Noraini, Mohd Razali

    Published 2015
    “…Therefore, it can be stated that the genetic algorithm approach developed in this study is efficient in solving large scale vehicle routing problem subject to precedence constraints with the objective of minimizing the distance travelled.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing by Naha, Ranesh Kumar

    Published 2015
    “…In order to make our proposed method cost efficient, we developed Load Aware Over Cost algorithm which is 8% cost effective comparing with Load Aware algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers by Khoshkholghi, Mohammad Ali, Derahman, Mohd Noor, Abdullah, Azizol, Subramaniam, Shamala, Othman, Mohamed

    Published 2017
    “…Cloud computing has evolved with the development of large-scale data centers, including thousands of servers around the world. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment by Aqel, Mohammad O. A.

    Published 2016
    “…Therefore, a new technique and algorithm were developed to resolve the image scale uncertainty. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Integration of fuzzy logic control algorithm in the development of optical fiber daylighting system for energy savings / Fuziah Sulaiman. by Sulaiman, Fuziah

    Published 2006
    “…The fuzzy automated lighting and dimming controller was successfully designed and developed. The scale modeling experiments revealed that the passive daylight collector and the larger diameter of 14 mm solid core endlight polymer optical fibres are most suitable for tropical climate. …”
    Get full text
    Get full text
    Thesis
  10. 10

    New Quasi-Newton Equation And Method Via Higher Order Tensor Models by Gholilou, Fahimeh Biglari

    Published 2010
    “…Moreover, a new limited memory QN method to solve large scale unconstrained optimization is developed based on the modified BFGS updated formula. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development of bi-objective optimization model for supply chain network design using data envelopment analysis by Rahimi, Iman

    Published 2017
    “…The developed model and solution method show excellence performance in terms of CPU time for the large scale. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…Adopting the medoid instead of the mean can enhance the efficiency. However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks by A. A Aziz, Azrina, Sekercioglu, Y. Ahmet, Fitzpatrick, Paul, Ivanovich, Milosh

    Published 2013
    “…First, we review the significant topology control algorithms to provide insights into how energy efficiency is achieved by design. …”
    Get full text
    Get full text
    Citation Index Journal
  15. 15

    Analysing small scale distribution generation PV and wind system in islanded mode by Jama, Amar Abdi

    Published 2021
    “…The performance of the PV array is analysed in terms of the MPPT efficiency, and MPPT successfully tracks the array rated power to be 298 W, where the efficiency of the algorithm is 99%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Evolutionary Algorithms In Auction Models Of Service Procurement by Lee, Chen Wei

    Published 2019
    “…However, previous researchers focused on solving mixed integer model for the CA based WDP, which is not efficient for large scale instance. Therefore, this research proposed an implementation of genetic algorithm (GA) with knowledge based operators as an alternative to approximate the solution.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Real Coded Genetic Algorithm (RCGA): a new RCGA mutator called Scale Truncated Pareto Mutation by Lim, Siew Mooi, Sulaiman, Md. Nasir, Md. Sultan, Abu Bakar, Mustapha, Norwati, Tejo, Bimo Ario

    Published 2014
    “…This paper presents a comparison in the performance analysis between a newly developed mutation operator called Scaled Truncated Pareto Mutation (STPM) and an existing mutation operator called Log Logistic Mutation (LLM). …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Multilevel optimization for dense motion estimation by Saaban, Azizan, Kalmoun, El Mostafa, Ibrahim, Haslinda, Ramli, Razamin, Omar, Zurni

    Published 2011
    “…We evaluated the performance of different optimization techniques developed in the context of optical flow computation with different variational models.In particular, based on truncated Newton methods (TN) that have been an effective approach for large-scale unconstrained optimization, we developed the use of efficient multilevel schemes for computing the optical flow.More precisely, we evaluated the performance of a standard unidirectional multilevel algorithm - called multiresolution optimization (MR/Opt), to a bidrectional multilevel algorithm - called full multigrid optimization (FMG/Opt).The FMG/Opt algorithm treats the coarse grid correction as an optimization search direction and eventually scales it using a line search. …”
    Get full text
    Get full text
    Get full text
    Monograph