Search Results - (( java implementation using algorithm ) OR ( parameter adaptation scheduling algorithm ))

Refine Results
  1. 1

    Dynamic traffic scheduling and resource reservation algorithms for output-buffered switches by Subramaniam, Shamala

    Published 2002
    “…The first algorithm is a priority scheduling algorithm (i.e. known as the M-Tier algorithm) incorporated with a multitier dynamic resource reservation algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems by Salman, Mustafa Ismael

    Published 2015
    “…More enhancements in downlink and uplink parameters are obtained when the energy efficient MPPM scheduler and the adaptive threshold feedback scheme are jointly implemented. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Constrained Self-Adaptive Harmony Search Algorithm With 2-Opt Swapping For Driver Scheduling Problem Of University Shuttle Bus by Shaffiei, Zatul Alwani, Abal Abas, Zuraida, Md Yunos, Norhazwani, Amir Hamzah, Amir Syafiq Syamin Syah, Zainal Abidin, Zaheera, Chong, Kuan Eng

    Published 2019
    “…A constrained self-adaptive harmony search algorithm (CSAHS) with 2-opt swapping (CSAHS-2opt) for driver scheduling problem of university shuttle bus (DSPUSB) was proposed in this study. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Modified Parameters of Harmony Search Algorithm for Better Searching by Nur Farraliza, Mansor, Abas, Z.A, Shibghatullah, A.S., Rahman, A.F.N.A

    Published 2017
    “…The model of constant step function is introduced in the alteration of HMCR parameter. The experimental results revealed that our proposed approach is superior than parameter adaptive harmony search algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…In addition, the marking probability mechanism was studied to check how the parameters in the traffic rate affect fairness. Additionally, the traffic are relying on the markers and scheduling algorithms to the service classes at the routers. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Secondly, a Load-Aware Weighted Round Robin algorithm (LAWRR) packet scheduling discipline for downlink traffic in 802.16 networks is proposed to improve the poor performance of scheduling algorithm that use static weights under bursty traffic. …”
    Get full text
    Get full text
    Thesis
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Using scatter search algorithm in implementing examination timetabling problem by Mohammed M.A., Ghani M.K.A., Mostafa S.A., Ibrahim D.A.

    Published 2023
    “…The study investigates the most suitable parameters of Scatter Search algorithm for the population based algorithm. …”
    Article
  10. 10

    A discrete event simulation for utility accrual scheduling in uniprocessor environment by Ahmad, Idawaty, K. Subramaniam, Shamala, Othman, Mohamed, Ahmad Zukarnain, Zuriati

    Published 2011
    “…These criteria are named as Utility Accrual (UA). The TUF/ UA scheduling algorithms are design for adaptive real time system environment. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali by Ihsan , Ali

    Published 2024
    “…To address relay node selection and data scheduling issues, Energy-Efficient Scheduling (EES) and Energy-Efficient Un-Scheduling (EEUS) methods have been introduced using the Improved Discrete Bat Algorithm (IDBA) along with the Adaptive Warshal Floyd algorithm (AWF). …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptive multi-polling scheduler for QoS support of video transmission in IEEE 802.11e WLANs by Al-Maqri, Mohammed A., Othman, Mohamed, Mohd Ali, Borhanuddin, Mohd Hanapi, Zurina

    Published 2016
    “…In this paper, we present a dynamic TXOP assignment algorithm called adaptive multi-polling TXOP scheduling algorithm (AMTXOP) for supporting the video traffics transmission over IEEE 802.11e wireless networks. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A discrete event simulation framework for utility accrual scheduling algorithm in uniprocessor environment by Ahmad, Idawaty, K. Subramaniam, Shamala, Othman, Mohamed, Ahmad Zukarnain, Zuriati

    Published 2011
    “…These criteria are named as Utility Accrual (UA). The TUF/ UA scheduling algorithms are design for adaptive real time system environment. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing by Yahaya, Bakri

    Published 2016
    “…Multi-Instance Broker Scheduling Algorithm (MiBSA) has been proposed as a new scheduling algorithm to get rid of the drawback from the iHLBA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt by Shaffiei, Zatul Alwani

    Published 2021
    “…Therefore, a tasks distribution in driver scheduling using dynamic set of bandwidth in harmony search algorithm with 2-opt (SBHS2-opt) was proposed in this research. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  18. 18

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Motion planning and control for autonomous vehicle collision avoidance systems using potential field-based parameter scheduling by Nurbaiti, Wahid, Hairi, Zamzuri, Noor Hafizah, Amer, Dwijotomo, Abdurahman, Sarah ‘Atifah, Saruchi

    Published 2024
    “…This study proposed a motion planning and control strategy for an autonomous vehicle collision avoidance system based on the potential field (PF) approach with a combination of the parameter scheduling technique. A particle swarm optimization algorithm is used to optimize the knowledge database information that is developed based on the perception of driver toward risk in the driving environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  20. 20

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis