Search Results - (( development evaluation window algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- development evaluation »
- evaluation window »
- window algorithm »
- java simulation »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
2
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
3
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
5
Windows-Based bandwidth allocation on optical networks
Published 2009“…We hope in the next article we will make a comparison table among static and dynamic bandwidth allocations algorithms and propose an algorithm on dynamic bandwidth allocation and evaluate our proposed algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
6
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
Get full text
Get full text
Student Project -
9
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
10
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…Lately, a fully online buffer-based clustering algorithm for handling evolving data streams (BOCEDS) was developed. …”
Article -
11
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…The algorithm development combines the frameworks from Phases 1 to 3, evaluating real and synthetic datasets. …”
Get full text
Get full text
Get full text
Thesis -
12
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
13
Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction
Published 2019“…Comparison of this framework continue in some of the state-of-the-arts algorithm in the literature and the results is outperformed based on the proposed algorithm experimental result.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
-
15
An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani
Published 2015“…The new urban areas identified from the binary images are classified to their urban growth forms using moving window, topological relation border length and landscape expansion index algorithms. …”
Get full text
Get full text
Thesis -
16
Epileptic Seizure Detection Using Singular Values And Classical Features Of EEG Signals
Published 2014“…This project aims at developing an automated epileptic seizure event detection algorithm. …”
Get full text
Get full text
Final Year Project -
17
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
18
WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10
Published 2022“…The amount of data type evidence collections and security measures to secure the integrity of evidence collected are measured by evaluating available tools, developing a proof-of-concept toolkit, and comparingfunctioning tools. …”
Get full text
Get full text
Article -
19
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
Published 2024“…The use of the SHA-256 hash algorithm currently considered secure and resistant to collision attacks. …”
Get full text
Get full text
Get full text
Article -
20
Retinal image blood vessel extraction and quantification with Euclidean distance transform approach
Published 2020“…The significantly high accuracy in this newly developed vessel diameter quantification algorithm indicates excellent potential for further development, evaluation, validation, and integration into ophthalmic diagnostic instruments.…”
Get full text
Get full text
Get full text
Article
