Search Results - (( java simulation optimization algorithm ) OR ( some integration process algorithm ))

Refine Results
  1. 1
  2. 2

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  5. 5

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  8. 8

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    VHDL modeling of optimum measurement selection by using genetic algorithm by Ullah, Mohammad Habib, Hasan, Muhammad Asfarul, Uddin, Md. Jasim, Priantoro, Akhmad Unggul

    Published 2009
    “…It is designed in a way that it can be mapped into an Integrated Circuit (IC). Some issues in the design need some further consideration. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    The development of integrated planning and scheduling framework for dynamic and reactive environment of complex manufacturing problem by Zakaria, Zalmiyah, Deris, Safaai, Mat Yatim, Safie, Othman, Muhamad Razib

    Published 2008
    “…Secondly, in Chapter 2 we described the modeling of the real world manufacturing processes using Petri Nets. We present two models of manufacturing process, namely machine model and process model. …”
    Get full text
    Get full text
    Get full text
    Monograph
  11. 11

    Deploying blockchains to simplify AI algorithm auditing by Butt, Ayesha, Zahid Junejo, Aisha, Ghulamani, Sumbul, Mahdi, Ghulam, Shah, Asadullah, Khan, Dodo

    Published 2023
    “…Moreover, this review also discusses some potential challenges that need to be addressed and some future recommendations for this integration.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…Process of authentication can be defined as developing a unique mapping process from given password to some other unique information in a defined domain. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    A genetic algorithm based student attendance management system with biometric identification / Mohammad Hanif Rashid by Rashid, Mohammad Hanif

    Published 2014
    “…We have incorporated Generic Algorithm (GA) in one stage of the system. The importance of using the Genetic Algorithm is to find the best fingerprints after going through all processes of selection, cross-over and mutation. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Mobile technology generations and cryptographic algorithms: analysis study by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2016
    “…At the same time, various mobile generations are susceptible to attack via eavesdropping and information leaking operations. Therefore, some cryptographic algorithms have proposed as confidentiality and integrity algorithms in different mobile generations, in order to prevent or mitigate these harmful operations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. SecPath is evaluated with several variations using 400 nodes in WSN deployments as well as large-scale simulations. …”
    Get full text
    Get full text
    Thesis
  20. 20