Search Results - (( java implication drops algorithm ) OR ( software migration using algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Elitist hybrid migrating birds optimization and genetic algorithm based strategy for T-way test suite generation by Hasneeza Liza, Zakaria

    Published 2020
    “…Addressing the aforementioned issues, this research proposes the development and implementation of hybrid t-way strategy based Migrating Birds Optimization Algorithm (MBO) and Genetic Algorithm (GA) with elitism, termed Elitist Hybrid MBO-GA. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Clustering-based cloud migration strategies by Aslam, M., Rahim, L.B.A., Watada, J., Hashmani, M.

    Published 2018
    “…The k-means algorithm of the partitioning clustering method is used to analyze cloud migration strategies in this study. …”
    Get full text
    Get full text
    Article
  4. 4

    Clustering-based cloud migration strategies by Aslam, M., Rahim, L.B.A., Watada, J., Hashmani, M.

    Published 2018
    “…The k-means algorithm of the partitioning clustering method is used to analyze cloud migration strategies in this study. …”
    Get full text
    Get full text
    Article
  5. 5

    Improving oil palm fresh fruit bunch grading system via software and hardware modifications by Shabdin, Muhammad Kashfi

    Published 2016
    “…This problem is due to the size of the image captured which is 1Gb per image. Therefore, the algorithm was migrated to a standalone software using LabVIEW. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    FuMAM: fuzzy-based mobile agent migration approach for data gathering in wireless sensor networks by Qadori, Huthiafa Q., Ahmad Zukarnain, Zuriati, Mohd Hanapi, Zurina, Subramaniam, Shamala

    Published 2018
    “…A mobile agent (MA) was recently proposed to provide an alternative solution for traditional data gathering in wireless sensor networks. An MA is a software component that can migrate among network nodes by following an assigned itinerary (or path). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Energy and performance efficient resource allocation for cloud-based data centers by Akhter, Nasrin

    Published 2015
    “…Dynamic VM consolidation leverages fine grained fluctuations in the application workloads, and continuously reallocates VMs using live migration to minimize the number of active physical nodes. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Reliability-aware swarm based multi-objective optimization for controller placement in distributed SDN architecture by Ibrahim, Abeer A.Z., Hashim, Fazirulhisyam, Sali, Aduwati, Noordin, Nor K., Navaie, Keivan, Fadul, Saber M.E.

    Published 2023
    “…The effectiveness of our hybrid RDMCP-PSO was then evaluated using extensive experiments and compared with other baseline algorithms. …”
    Get full text
    Get full text
    Article
  13. 13

    Review on ubiquitous education system with multi-agent synchronization on mobile learning application environment by Mwinyi, Amir Kombo, Syed Mohamed, Syed Abdul Rahman Al Haddad, Abdullah, Rusli, Hashim, Shaiful Jahari

    Published 2012
    “…The sync agent (Multi-agent system) proposed algorithm is based on the use of mobile agents which runs from the host (sender) computer and then migrates to the receiving (receiver) mobile computer to continue the process of updating learning contents before coming back to the sender for completing the process. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…The use of software-agent based middleware that is intelligent, enables the system to adapt to the ever changing in taste and preferences of users when predicting the buying intention, thus making the online marketing to be highly effective. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18

    Generation of IPv6 addresses based on one-to-many reversible mapping using AES by Hakiem, Nashrul, Priantoro, Akhmad Unggul, Siddiqi, Mohammad Umar, Hasan, Talib Hashim

    Published 2012
    “…Each time a user tries to access the network, different IPv6 address will be given which is generated using CFB (Cipher Feedback) mode of AES (Advanced Encryption Standard) algorithm, whereby there is a one-to-many reversible mapping between user and IPv6 addresses. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter