Search Results - (( java simulation optimization algorithm ) OR ( _ implementation drops algorithm ))

Refine Results
  1. 1
  2. 2

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  5. 5

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  8. 8

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    IWDSA: a hybrid Intelligent Water Drops with a Simulated Annealing for the localization improvement in wireless sensor networks by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2024
    “…The proposed algorithm, named Intelligent Water Drops with Simulated Annealing (IWDSA), combines two powerful optimization methods: Intelligent Water Drops (IWD) and Simulated Annealing (SA). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    QoS evaluation of different TCPs congestion control algorithm using NS2 by Tarmizi, M., Albagul, A., Khalifa, Othman Omran, Wahyudi, Martono

    Published 2006
    “…To achieve this, the users implement a flow control algorithm that controls the rate at which data packets are sent into the Internet. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column by Maan, Normah

    Published 2005
    “…This eventually brought the study to the implementation of the Inverse Single Drop Multistage (ISDMS)-2D Fuzzy Algorithm on the Mass Transfer of Multiple Drops in Multistage System. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Experimental implementation controlled SPWM inverter based harmony search algorithm by Najeeb, Mushtaq, Mansor, Muhamad, Razali, Ramdan, Daniyal, Hamdan, A. F. Yahaya, Jabbar

    Published 2017
    “…Then, the control algorithm of the inverter prototype is experimentally implemented using the eZdsp F28355 board along with the bipolar sinusoidal pulse width modulation (SPWM) to control the output voltage drop under different load conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Performance Comparison of Packet Queuing Algorithm in Wireless Networks by Nor Aida, Mahiddin, Raja Hasyifah, Raja Bongsu, Wan Nor Shuhadah, Wan Nik

    Published 2014
    “…Therefore, a good strategy of packet queuing algorithm is very important to avoid packets drop. …”
    Get full text
    Get full text
    Article
  17. 17

    Performance Comparison of Packet Queuing Algorithm in Wireless Networks by Nor Aida, Mahiddin, Raja Hasyifah, Raja Bongsu, Wan Nor Shuhadah, Wan Nik

    Published 2014
    “…Therefore, a good strategy of packet queuing algorithm is very important to avoid packets drop. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri by Mohd Zamri, Muhammad Azrill

    Published 2017
    “…Future implementations of this technique should consider a higher amount of training data to produce a higher accuracy.…”
    Get full text
    Get full text
    Thesis
  19. 19

    An enhanced congestion control algorithm for LEO satellite networks by Ayob, Fahrul Hakim, Subramaniam, Shamala, Othman, Mohamed, Zulkarnain, Zuriati

    Published 2018
    “…In this research, there is a potential for TCP WestwoodNew to be improved by increasing its throughput and implemented in satellite networks. In this research, we suggest that the congestion avoidance algorithm of TCP WestwoodNew to be modified. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20