Search Results - (( image implementation level algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH by MOHD YAKOP, SITI HAJAR

    Published 2006
    “…The objective of this project is to develop algorithms inMATLAB and be able to implement image texture analysis by using the developed algorithms. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  6. 6

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification by Mohamed Ali, Mohamed Hassan

    Published 2017
    “…The algorithm was mainly inspired by spatial pyramid pooling in generic image classification combined with PCA. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A new image scrambling technique using block rotation algorithm based on Rubik’s cube by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2013
    “…The relationship among the adjacent pixels of image is very high. Also, Most image scrambling algorithms apply one iteration level scrambling that cause a high possibility of occurs the weakness of visual leakage on the image scrambling algorithm which can be reflected by the corresponding scrambled image. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A new image scrambling approach using block-based on shifted algorithm by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2013
    “…This makes the scrambled images difficult to decode thus providing a high level of security protection for the images. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Implementation of Parallel K-Means Algorithm to Estimate Adhesion Failure in Warm Mix Asphalt by Akhtar, M.N., Ahmed, W., Kakar, M.R., Bakar, E.A., Othman, A.R., Bueno, M.

    Published 2020
    “…To attain high accuracy from image processing algorithms, the loss of pixels plays an essential role. …”
    Get full text
    Get full text
    Article
  15. 15

    A New Approach in a Gray-Level Image Contrast Enhancement by using Fuzzy Logic Technique by Hussain K., Khaleaf, Kamarul Hawari, Ghazali, Mithaq Na'ma, Raheema, Abdalla, Ahmed N.

    Published 2015
    “…By using Matlab was implemented the algorithm, and applied to difference gray level images such as old documents images, biomedical images, most of them gives very good results especially with the biomedical images, because of its significant impact on the adjustment of lighting in dark images, clarify its edges, clarify their features and improved image quality.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…In order to increase the robustness of the proposed algorithm, the level of noise in digital image can be estimated if the noise standard deviation σ is unknown. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin by Engku Safruddin, Engku Maryam Syahdina

    Published 2018
    “…The aim of this study were to conduct a research on how to identify the implementation of security analysis of image using 3D-AES block cipher algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    BinDCT Design and Implementation on FPGA with Low Power Architecture by Jabbar, Mohamad Hairol

    Published 2008
    “…As Discrete Cosine Transform (DCT) is dominant in many international standards for image/video and audio compression, the introduction of multiplierless algorithm for fast DCT computation known as BinDCT (Binary DCT) is very well suited for VLSI implementation. …”
    Get full text
    Get full text
    Thesis