Search Results - (( java implementation ant algorithm ) OR ( using computational study algorithm ))
Search alternatives:
- java implementation »
- computational study »
- implementation ant »
- ant algorithm »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
2
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…In this thesis study, hybrid Genetic Algorithm and Bat Algorithm proposed to solve the task scheduling problem. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Scheduling jobs in computational grid using hybrid ACS and GA approach
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…A uniform platform was proposed for the QAPU used in the present study. At first, the hybrid architecture was designed for the quantum algorithms. …”
Get full text
Get full text
Thesis -
5
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Block Matching Algorithm (BMA) is a technique used to minimize the computational complexity of motion estimation in video coding application. …”
Get full text
Get full text
Thesis -
6
-
7
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…Task scheduling and resource allocation are essential aspects of cloud computing. This Study proposes task scheduling in cloud computing using a hybrid genetic algorithm, and bald eagle search proposed to solve the task scheduling problem. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Phishing attack detection using machine learning method
Published 2019“…However, in this wide use of this computer network, the privacy of computer users is in danger. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…The LIA is considered a novel algorithm that adapts the study of locust movement behaviour from biology to job scheduling in the cloud computing environment. …”
Get full text
Get full text
Thesis -
12
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…Thus, Discrete Event Simulation is used as the research methodology in this study. In brief, this research aims to solve resource management issues so as to enhance the grid computing performance. …”
Get full text
Get full text
Get full text
Thesis -
13
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
Get full text
Get full text
Get full text
Article -
14
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
Get full text
Get full text
Get full text
Thesis -
15
An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma
Published 2017“…This study contributes significantly in reducing the computational complexity and running time as compared with Normal Parameter Reduction algorithm (NPR) and New Efficient Normal Parameter Reduction algorithm (NENPR).…”
Get full text
Get full text
Get full text
Thesis -
16
An efficient model for indoor radio signal prediction and coverage estimation / Md. Sumon Sarker
Published 2011“…Ray tracing is of vast use in the field of computational electromagnetic, such as the well known shooting and bouncing ray (SBR) algorithm. …”
Get full text
Get full text
Thesis -
17
Dam haji game using A* search algorithm / Siti Farah Najwa Mukhlis
Published 2017“…Therefore many research have been done to develop this type of computer game by using the Al techniques. In Dam Haji game, the goal is to find the optimal movement to make, so A* algorithm, which is a pathfinding algorithm is used. …”
Get full text
Get full text
Thesis -
18
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
19
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Previous study by Leong show the useful of CAD system but her study is not fully automated. …”
Get full text
Get full text
Thesis -
20
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…This study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code and Vertex chain code algorithm as picture description language, and a new computational algorithm and neural network classifier for corner detection. …”
Get full text
Get full text
Monograph
