Search Results - (( development program normalization algorithm ) OR ( java managers selection algorithm ))

Refine Results
  1. 1

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The algorithm consists of three new mechanisms that organize the work of an ant colony i.e. initial pheromone value mechanism, resource selection mechanism and pheromone update mechanism. …”
    Get full text
    Get full text
    Get full text
    Monograph
  2. 2

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…Moreover,improper management of intermediate databases may adversely affect the execution time and memory utilization. …”
    Get full text
    Thesis
  5. 5

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Beside that, this research also has to fulfill the objective of find the comparison of the three types of selection methods which roulette wheel selection, tournament selection and rank selection. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…We find that the parallel programming is about 5.75 times faster than the normal programming while its efficiency is capped at 0.443.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…Two techniques were developed. The first technique is to encode the logic programming in radial basis function neural networks. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Saputra , Dhany, Rambli, Dayang R.A., Foong, Oi Mean

    Published 2008
    “…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…The prototype is constructed through software and hardware development and has been programmed using Arduino IDE software. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    Data mining in network traffic using fuzzy clustering by Mohamad, Shamsul

    Published 2003
    “…The network traffic model is very important to know whether that particular network traffic is normal or abnormal. In this project, I have developed a program to capture and filter the packets based on the application. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Data mining in network traffic using fuzzy clustering by Mohamad, Shamsul

    Published 2003
    “…The network traffic model is very important to know whether that particular network traffic is normal or abnormal. In this project, I have developed a program to capture and filter the packets based on the application. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Multi -Objective Economic Dispatch Using Evolutionary Programming by Noor Azlan Bin Adnan

    Published 2023
    “…The designated algorithm of MOEP used MATLAB to run the simulations. …”
  19. 19

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Modeling Computational Problem Solving (CPS) is the main issue in teaching programming where the given text is needed to be transformed into a model then later into a programming language. …”
    Get full text
    Get full text
    Thesis
  20. 20