Search Results - (( java implementation using algorithm ) OR ( a simulation max algorithm ))

Refine Results
  1. 1

    Batch mode heuristic approaches for efficient task scheduling in grid computing system by Maipan-Uku, Jamilu Yahaya

    Published 2016
    “…We simulate our proposed algorithms using a Java based simulator that is purposedly built for Grid computing simulations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3
  4. 4

    An event-driven simulation for highest urgency first (HUF) : a latency and modulation aware bandwidth allocation algorithm for WiMAX base stations. by Naghshbandi, Danial, Subramaniam, Shamala, Moghadam, Saeed Rahimi

    Published 2013
    “…This research has focused at developing a discrete-event simulator to implement bandwidth allocation algorithms for a WiMAX base station.The highest urgency first algorithm has been utilized as a benchmark deployment algorithm in order to provide: dynamic downlink/uplink adjustment and latency guarantee for real-time applications. …”
    Get full text
    Get full text
    Article
  5. 5

    Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E by Oad, Aneel

    Published 2013
    “…The simulation results indicate that legacy algorithms are not suitable for the multi-class traffic systems of WiMAX. …”
    Get full text
    Get full text
    Thesis
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Max-average: an extended max-min scheduling algorithm for Grid computing environtment by Maipan-uku, J. Y., Muhammed, Abdullah, Abdullah, Azizol, Hussin, Masnida

    Published 2016
    “…This paper presents a new proposed grid based scheduling algorithm called Max-Average, inspired from Max-Min algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A particle swarm optimization and min-max­-based workflow scheduling algorithm with QoS satisfaction for service-­oriented grids by Ambursa, Faruku Umar, Latip, Rohaya, Abdullah, Azizol, K. Subramaniam, Shamala

    Published 2017
    “…It hybridises PSO with a novel look-ahead mechanism based on a min–max heuristic, which deterministically improves the quality of the best solutions. …”
    Get full text
    Get full text
    Article
  9. 9

    OTS: an optimal tasks scheduling algorithm based on QoS in cloud computing network by Alhakimi, Mohammed Ameen, Latip, Rohaya

    Published 2019
    “…This study presents an optimal tasks scheduling algorithm by enhancing Max-Min algorithm. The simulation results have proven that the Proposed Optimal Tasks Scheduling OTS completes tasks execution with less execution time and higher performance compared with Max-Min and TS algorithms. …”
    Get full text
    Get full text
    Article
  10. 10

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  11. 11

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX. by Mohd Ali, Borhanuddin, Ismail, Alyani, Noordin, Nor Kamariah, Ben-Mubarak, Mohammed A., Ng , Ben Chee Kyun

    Published 2013
    “…In this paper, a fuzzy logic based self-adaptive handover (FuzSAHO) algorithm is introduced. …”
    Get full text
    Get full text
    Article
  13. 13

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Simulation model to improve QoS performance over fixed WiMAX using OPNET by Lawal, I.A., Md Said, A., Mu'azu, A.A.

    Published 2013
    “…A Model was developed based on the proposed new distributed model (Master-Slave), the first scenario comprised of 3 Base Stations (BS) and thirty Subscriber Station (SS) with one Master BS selected by the designed algorithm (Nearest Neighborhood Algorithms). …”
    Get full text
    Get full text
    Article
  15. 15

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Adaptive beamforming with 16 element linear array using MaxSIR and MMSE algorithms by Islam, Md. Rafiqul, Hafriz, Fahmy, Norfauzi, Muhammad

    Published 2007
    “…Both algorithms were calculated and simulated using Matlab as well as Zeland’s IE3D software. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Maximum 2-satisfiability in radial basis function neural network by Shehab Abdulhabib Alzaeemi, Saratha Sathasivam, Mohd Shareduwan Mohd Kasihmuddin, Mohd. Asyraf Mansor

    Published 2020
    “…MAX2SAT is a case of MAX-kSAT and is written in Conjunctive Normal Form (CNF) with two variables in each clause. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks by Mubarak, Mohammed Awadh Ahmed Ben

    Published 2013
    “…For real-time applications, simulation results show that RFuzSAHO decision algorithm enhances the VoIP quality (Mean Opinion Score, MOS) up to 5.4% compared to FuzSAHO algorithm when the MS velocity is 20m/s.…”
    Get full text
    Get full text
    Thesis