Search Results - (( java evaluation new algorithm ) OR ( java implementation max algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Batch mode heuristic approaches for efficient task scheduling in grid computing system by Maipan-Uku, Jamilu Yahaya

    Published 2016
    “…Many algorithms have been implemented to solve the grid scheduling problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4
  5. 5
  6. 6

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It also allow for further research and development on the same or new approach. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Third approach is transforming identifiers to junk code to hide the meaning and increase the complexity of the code. Empirical evaluation was conducted to evaluate the proposed Hybrid Obfuscation Technique. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…A well known task is classification that predicts the class of new instances using known features or attributes automatically. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…The research experiment has shown the process of calculating the Distance matrix for the sample Java Programs and subsequent evaluation using the mutation testing approach and APFD calculation. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…The performance of CBH protocol is evaluated theoretically and using simulations. A discrete event simulator called GridSim and Java programming language is used to simulate the proposed protocol. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. As an extension to the scheme for enabling users to authenticate to the IIoT connected devices while Internet access is unavailable, a new offline multi-factor authentication scheme for the automotive industry is proposed. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
    Get full text
    Get full text
    Thesis