Search Results - (( development communication optimisation algorithm ) OR ( java loading optimization algorithm ))
Search alternatives:
- communication optimisation »
- development communication »
- optimisation algorithm »
- loading optimization »
- java »
-
1
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…This research proposes an enhancement of the ant colony optimization algorithm that caters for dynamic scheduling and load balancing in the grid computing system. …”
Get full text
Get full text
Get full text
Monograph -
2
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…This research proposes an Enhanced Ant Colony Optimization (EACO) algorithm that caters dynamic scheduling and load balancing in the grid computing system. …”
Get full text
Get full text
Get full text
Thesis -
3
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
5
-
6
Gateway placement optimisation problem for mobile multicast design in wireless mesh networks
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
7
An extended adaptive mechanism of evolutionary based channel assignment via reinforcement
Published 2012“…Current development in the field of wireless mobile communication is extremely limited by the capacity constraints of the available frequency spectrum. …”
Get full text
Get full text
Research Report -
8
Development of a scalable video compression algorithm
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
9
-
10
-
11
-
12
-
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Smart site monitoring system / Muhammad Azmi and Muhammad Naim Mahyuddin
Published 2023“…The Smart Site Monitoring System is an innovative and integrated approach designed to optimise a construction site management. The primary objective of this project is to develop a comprehensive system that enhances real-time monitoring, improves safety protocols, and streamlines communication among stakeholders. …”
Get full text
Get full text
Conference or Workshop Item -
17
Machine Learning-Enabled Communication Approach for the Internet of Medical Things
Published 2023“…Apart from that, every device is bound to hold a supplementary path, preferably a second optimised path, for situations where the current communication path is no longer available, either due to device failure or heavy traffic. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Computational intelligence approach for classification and risk quantification of metabolic syndrome / Habeebah Adamu Kakudi
Published 2019“…Genetic Algorithm(GA) is used to optimize the order of sequence of the input sample and the parameters of the Bayesian ARTMAP (BAM). …”
Get full text
Get full text
Get full text
Thesis -
19
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…Therefore, pedestrian behaviour classification is a perfect solution in providing safety for both pedestrians and vehicles by exchanging movement information among entities via wireless communication. However, wireless communication has critical issues with network failure, and these issues significantly affect the communication system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…Therefore, pedestrian behaviour classification is a perfect solution in providing safety for both pedestrians and vehicles by exchanging movement information among entities via wireless communication. However, wireless communication has critical issues with network failure, and these issues significantly affect the communication system. …”
Get full text
Get full text
Get full text
Get full text
Thesis
