Search Results - (( intelligence based scheduling algorithm ) OR ( intelligence _ cloud algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Two objectives big data task scheduling using swarm intelligence in cloud computing by Diallo, Laouratou, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke, Islam, Shayla, Zarir, Abdullah Ahmad

    Published 2016
    “…In this direction, this paper first gives review of some previous scheduling algorithms used in cloud. Then, it proposes a type of swarm intelligence called Particle Swarm Optimization (PSO) algorithm to diminish cost though meeting deadlines. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Hybrid ant colony system algorithm for static and dynamic job scheduling in grid computing by Alobaedy, Mustafa Muwafak Theab

    Published 2015
    “…One of the prominent intelligent algorithms is ant colony system (ACS) which is implemented widely to solve various types of scheduling problems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Scheduling Algorithm For Lot Movement in Semiconductor Wafer Fabrication by Norzieyuswati, Md Zenal

    Published 2008
    “…Imitating the collective activities of ant colonies, an approach to constructing pheromone-based scheduling algorithm using Ant Colony Optimization for lot movement in semiconductor wafer fabrication process is propose to be implemented in SilTerra Malaysia.…”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    African Buffalo Optimization (ABO): A New Metaheuristic Algorithm by Odili, Julius Beneoluchi, M. N. M., Kahar

    Published 2015
    “…The African Buffalo Optimization (A.B.0) algorithm simulates the African buffalos' behaviour by encapsulation in a mathematical model; which solves a number of discrete optimization problems using graph-based route planning, job scheduling and it extends Swarm Intelligence paradigms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Modeling approach of cloud 4D printing service composition optimization based on non-dominated sorting genetic algorithm III by Liu, Jiajia, Zainudin, Edi Syams, As'arry, Azizan, Ismail, Mohd Idris Shah

    Published 2024
    “…This research provides valuable insights for the advancement of intelligent cloud-based 4D printing systems, paving the way for future developments in this field.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Furthermore, the algorithm to generate tag cloud visualization based on personality traits has not been explored. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Series division method based on PSO and FA to optimize Long-Term Hydro Generation Scheduling by Hammid, Ali Thaeer, M. H., Sulaiman

    Published 2018
    “…To deal with this complicated problem, Series division method (SDM) based on the practical swarm optimization and the firefly algorithm is proposed in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
    text::Thesis
  20. 20