Search Results - (( development using commitment algorithm ) OR ( java implementation colony algorithm ))
Search alternatives:
- implementation colony »
- commitment algorithm »
- java implementation »
- development using »
- using commitment »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
2
Solving unit commitment using Shuffled Frog Leaping Algorithm (SFLA) / Fashirul Azmeer Mohd Fadzil
Published 2015“…The simulation results obtained using the proposed algorithm show that the minimum cost can be obtained for the schedule.…”
Get full text
Get full text
Thesis -
3
Multi-objective pareto ant colony system based algorithm for generator maintenance scheduling
Published 2022“…The IEEE RTS 26, 32 and 36-unit dataset systems were used in the performance evaluation of the PACS algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Application of Artificial Neural Networks (ANN) for unit commitment prediction / Robert Engkiau
Published 2003“…Dedicated artificial neural networks can handle a large number of inequality constraints included in unit commitment. Results from existing Genetic Algorithm (GA) program were used as the NN training and testing data set. …”
Get full text
Get full text
Thesis -
5
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Thesis -
6
Effect of business social responsibility (BSR) on performance of SMEs in Nigeria
Published 2014“…This study used purposive sampling for sample selection. Partial Least Squares (PLS) algorithm and bootstrap techniques were used to test the study‘s hypotheses. …”
Get full text
Get full text
Get full text
Thesis -
7
UiTM Transportation Unit bus trip scheduling system / Noorzawanah Ab Rahim
Published 2009“…The user interface application has been developed by using Microsoft visual basic 6.0 and Microsoft access as it's database. …”
Get full text
Get full text
Thesis -
8
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023“…A number of popular existing algorithms were used to execute the model developed in Rapid tool such as Naïve Bayes , Neural Net , Deep Learning, Decision Tree, Logistic Regression, SVM and k-NN. …”
text::Thesis -
9
A modified shuffled frog leaping algorithm and its application to short-term hydrothermal scheduling / Mohamad Khairul Hakimi Abdul Hady
Published 2016“…This thesis discusses the solution of short-term hydrothermal scheduling problem using modified shuffled frog-leaping algorithm, which is inspired by the behavior of a group frog to find a place that has the most food optimization technique purpose that has been develop for solving the hydrothermal scheduling problem. …”
Get full text
Get full text
Thesis -
10
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…The interaction of different traffic type flows in a DiffServ networks using the proposed integration model between FWFQ and the dual token bucket shaper algorithm is analyzed. …”
Get full text
Get full text
Thesis -
11
Solving Unit Commitment Problem Using Multi-agent Evolutionary Programming Incorporating Priority List
Published 2023“…This paper presents an approach to solve the unit commitment problem using a newly developed Multi-agent Evolutionary Programming incorporating Priority List optimisation technique (MAEP-PL). …”
Article -
12
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…The results of the evaluation clearly show that the proposed algorithms significantly reduce energy consumption while providing a high level of commitment to the SLA. …”
Get full text
Get full text
Get full text
Article -
13
Statistically controlled robust trust computing mechanism for cloud computing
Published 2014“…Trust computing mechanisms can play an important role in identifying the right service providers who would meet the commitments specified in the Service Level Agreements.Literature has reported several trust computing mechanisms for different distributed systems based on various algorithms and functions.Almost all of them modify the trust scores monotonously even for momentary performance deviations that are reported.This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores using a hysteresis based algorithm.Hence the proposed mechanism can protect the trust scores from changes due to momentary fluctuations in system performances.The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long-term system performance than the ones that were computed without the validation of the inputs.…”
Get full text
Get full text
Get full text
Article -
14
Unit commitment in power system using multi-agent evolutionary programming incorporating priority listing optimisation technique / Muhammad Nazree Che Othman
Published 2013“…The search process then being refined using heuristic EP-based algorithm with multi-agent approach to produce the final solution. …”
Get full text
Get full text
Thesis -
15
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
16
Review of the machine learning methods in the classification of phishing attack
Published 2019“…There are several algorithms that can be used in the machine learning method to prevent these attacks. …”
Get full text
Get full text
Get full text
Article -
17
An enhanced fuzzy commitment scheme in biometric template protection
Published 2023“…Phase one, involved research review and analysis, followed by designing conceptual model and algorithm development in phase two and three respectively. …”
Get full text
Get full text
Get full text
Thesis -
18
Video traffic analysis on Unifi broadband network / Laina Sofia Mahamad
Published 2017“…Thirdly, to identify best traffic model based on fitted model in developing network traffic bandwidth control algorithms. …”
Get full text
Get full text
Thesis -
19
Examining leadership style and ethical reasoning in Nigeria public sector
Published 2016“…Partial Least Squares Method (PLS) algorithm was used for testing of the study‘s hypotheses. …”
Get full text
Get full text
Get full text
Thesis -
20
