Search Results - (( development among normalization algorithm ) OR ( java loading optimization algorithm ))
Search alternatives:
- normalization algorithm »
- loading optimization »
- among normalization »
- development among »
- java »
-
1
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…This research proposes an enhancement of the ant colony optimization algorithm that caters for dynamic scheduling and load balancing in the grid computing system. …”
Get full text
Get full text
Get full text
Monograph -
2
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…This research proposes an Enhanced Ant Colony Optimization (EACO) algorithm that caters dynamic scheduling and load balancing in the grid computing system. …”
Get full text
Get full text
Get full text
Thesis -
3
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
5
A new method for intermediate power point tracking for PV generator under partially shaded conditions in hybrid system
Published 2018“…This technique is based on the combination of two algorithms, the particle swarm optimization algorithm for tracking the global maximum power point, while a newly developed algorithm is used for attaining any other supervisory control set point. …”
Get full text
Get full text
Article -
6
Detection of corneal arcus using rubber sheet and machine learning methods
Published 2019“…The benchmark of the classification algorithm for CA is needed to analyze the optimal output of the algorithm. …”
Get full text
Get full text
Thesis -
7
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi
Published 2016“…Bandwidth Control Algorithms is developed based on Peak Time of day and night. …”
Get full text
Get full text
Article -
8
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi
Published 2016“…Bandwidth Control Algorithms is developed based on Peak Time of day and night. …”
Get full text
Get full text
Thesis -
9
Improved Genetic Algorithm Multilayer Perceptron Network For Data Classification
Published 2017“…It involves competition among best individuals from normal and improved population to ensure survival in the next generation. …”
Get full text
Get full text
Thesis -
10
Neural network based model predictive control for a steel pickling process
Published 2009“…The baths exhibit the normal features of an industrial system such as nonlinear dynamics and multi-effects among variables. …”
Get full text
Get full text
Article -
11
The new efficient and accurate attribute-oriented clustering algorithms for categorical data
Published 2012“…Categorical data clustering has attracted much attention recently due to the fact that much of the data contained in today’s databases is categorical in nature. Many algorithms for clustering categorical data have been proposed, in which attribute-oriented hierarchical divisive clustering algorithm Min-Min Roughness (MMR) has the highest efficiency among these algorithms with low clustering accuracy, conversely, genetic clustering algorithm Genetic-Average Normalized Mutual Information (G-ANMI) has the highest clustering accuracy among these algorithms with low clustering efficiency. …”
Get full text
Get full text
Thesis -
12
Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method
Published 2017“…The experimental results reveal that the developed algorithm is able to achieve an accuracy of 87.82% F1-measure based on images from the ECU database. …”
Get full text
Get full text
Thesis -
13
Optimized adaptive neuro-fuzzy inference system using metaheuristic algorithms: Application of shield tunnelling ground surface settlement prediction
Published 2021“…Results indicated that PPN dataset scenario significantly affected the prediction models in terms of their perdition accuracy. Among all the developed hybrid models, ANOFS-PSO model achieved the best predictability performance. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Noise Cancellation method in assistive listening system
Published 2020“…Those algorithms were Least Means Square, Normalize-Least Means Square, Recursive Least Square, Simple SetMembership Algorithm and Dynamic Set-Membership Affine Projection Algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Intrusion detection on the in-vehicle network using machine learning
Published 2021Get full text
Get full text
Get full text
Proceeding Paper -
17
-
18
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…The initial investigation on the existing LDPC code decoding algorithms assists to develop a low complexity LDPC code decoding algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Selective harmonic elimination in cascaded H-bridge multilevel inverter using hybrid APSO algorithm / Mudasir Ahmed
Published 2019“…Furthermore, among the developed topologies of MLIs, cascaded H-bridge (CHB) is preferable because of its simplicity and use of less number of components. …”
Get full text
Get full text
Get full text
Thesis -
20
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Researchers have been developing a system using intrusion detector approach base on differential analysis. …”
Get full text
Get full text
Monograph
