Search Results - (( java implementation force algorithm ) OR ( user computing values algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…VL-WIDE has accomplished a higher median value for the domination over state-of-the-art algorithms with a higher number of non- dominated solutions value than all other benchmarks. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Multi-objective scientific workflow scheduling algorithm in multi-cloud environment for satisfying QoS requirements by Ramadhan, Mazen Farid Ebrahim

    Published 2022
    “…Cloud computing is a high-performance distributed computing platform that integrates large-scale services. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media A., Abu Osman, Md. Tap

    Published 2011
    “…Originality/value – A new computational intelligence modeling scheme, based on the ELM has been investigated, developed and implemented, as an efficient and more accurate predictive solution for determining position of mobile users based on location fingerprint data (SS and SQ).…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…Data have been tampered and altered either by a computer user or unauthorized access via hacking. In this research, the Negative Selection Algorithms were deployed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media Anugerah, Md. Tap, Abu Osman

    Published 2011
    “…Originality/value – A new computational intelligence modeling scheme, based on the ELM has been investigated, developed and implemented, as an efficient and more accurate predictive solution for determining position of mobile users based on location fingerprint data (SS and SQ).…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Electroencephalogram signal interpretation system for mobile robot by Hasan, Intan Helina

    Published 2013
    “…Currently, the BCI application is to acquire signals from 32 to 64 electrodes’ recordings and translate them to a movement using various computing algorithm which can be used in wheelchair navigation, or control robot movements. …”
    Get full text
    Get full text
    Thesis
  20. 20

    The development of an automated pattern recognition based on neural network / Irni Hamiza Hamzah, Mohammad Nizam Ibrahim and Linda Mohd Kasim by Hamzah, Irni Hamiza, Ibrahim, Mohammad Nizam, Mohd Kasim, Linda

    Published 2006
    “…The capability of powerful personal computers and affordable and high resolution sensors (i.e.: CCD cameras, microphones and scanners) have fostered the development of pattern recognition algorithms in new application domains (i.e.: fuzzy logic, neural network and genetic algorithm). …”
    Get full text
    Get full text
    Research Reports