Search Results - (( java implication tree algorithm ) OR ( software migration using algorithm ))
Search alternatives:
- java implication »
- implication tree »
- migration using »
- using algorithm »
- tree algorithm »
-
1
Elitist hybrid migrating birds optimization and genetic algorithm based strategy for T-way test suite generation
Published 2020“…Addressing the aforementioned issues, this research proposes the development and implementation of hybrid t-way strategy based Migrating Birds Optimization Algorithm (MBO) and Genetic Algorithm (GA) with elitism, termed Elitist Hybrid MBO-GA. …”
Get full text
Get full text
Thesis -
2
-
3
Clustering-based cloud migration strategies
Published 2018“…The k-means algorithm of the partitioning clustering method is used to analyze cloud migration strategies in this study. …”
Get full text
Get full text
Article -
4
Clustering-based cloud migration strategies
Published 2018“…The k-means algorithm of the partitioning clustering method is used to analyze cloud migration strategies in this study. …”
Get full text
Get full text
Article -
5
Improving oil palm fresh fruit bunch grading system via software and hardware modifications
Published 2016“…This problem is due to the size of the image captured which is 1Gb per image. Therefore, the algorithm was migrated to a standalone software using LabVIEW. …”
Get full text
Get full text
Thesis -
6
Classification model for water quality using machine learning techniques
Published 2015Get full text
Get full text
Article -
7
FuMAM: fuzzy-based mobile agent migration approach for data gathering in wireless sensor networks
Published 2018“…A mobile agent (MA) was recently proposed to provide an alternative solution for traditional data gathering in wireless sensor networks. An MA is a software component that can migrate among network nodes by following an assigned itinerary (or path). …”
Get full text
Get full text
Get full text
Article -
8
Solving Economic Dispatch Problems with Practical Constraints Utilizing Differential Search Algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
9
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…Dynamic VM consolidation leverages fine grained fluctuations in the application workloads, and continuously reallocates VMs using live migration to minimize the number of active physical nodes. …”
Get full text
Get full text
Thesis -
10
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Reliability-aware swarm based multi-objective optimization for controller placement in distributed SDN architecture
Published 2023“…The effectiveness of our hybrid RDMCP-PSO was then evaluated using extensive experiments and compared with other baseline algorithms. …”
Get full text
Get full text
Article -
13
Review on ubiquitous education system with multi-agent synchronization on mobile learning application environment
Published 2012“…The sync agent (Multi-agent system) proposed algorithm is based on the use of mobile agents which runs from the host (sender) computer and then migrates to the receiving (receiver) mobile computer to continue the process of updating learning contents before coming back to the sender for completing the process. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…The use of software-agent based middleware that is intelligent, enables the system to adapt to the ever changing in taste and preferences of users when predicting the buying intention, thus making the online marketing to be highly effective. …”
Get full text
Get full text
Conference or Workshop Item -
16
A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Generation of IPv6 addresses based on one-to-many reversible mapping using AES
Published 2012“…Each time a user tries to access the network, different IPv6 address will be given which is generated using CFB (Cipher Feedback) mode of AES (Advanced Encryption Standard) algorithm, whereby there is a one-to-many reversible mapping between user and IPv6 addresses. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter
