Search Results - (( java implementation phase algorithm ) OR ( user computing values algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…VL-WIDE has accomplished a higher median value for the domination over state-of-the-art algorithms with a higher number of non- dominated solutions value than all other benchmarks. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Multi-objective scientific workflow scheduling algorithm in multi-cloud environment for satisfying QoS requirements by Ramadhan, Mazen Farid Ebrahim

    Published 2022
    “…Cloud computing is a high-performance distributed computing platform that integrates large-scale services. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media A., Abu Osman, Md. Tap

    Published 2011
    “…Originality/value – A new computational intelligence modeling scheme, based on the ELM has been investigated, developed and implemented, as an efficient and more accurate predictive solution for determining position of mobile users based on location fingerprint data (SS and SQ).…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…Data have been tampered and altered either by a computer user or unauthorized access via hacking. In this research, the Negative Selection Algorithms were deployed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media Anugerah, Md. Tap, Abu Osman

    Published 2011
    “…Originality/value – A new computational intelligence modeling scheme, based on the ELM has been investigated, developed and implemented, as an efficient and more accurate predictive solution for determining position of mobile users based on location fingerprint data (SS and SQ).…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20