Search Results - (( java simulation optimization algorithm ) OR ( using feature protocol algorithm ))

Refine Results
  1. 1
  2. 2

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  5. 5

    A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks by Jiang, Cailing

    Published 2019
    “…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    Fiber-Wireless testbed using software defined radio for protocol and algorithm testing by Ridwan M.A., Mohamed Radzi N.A., Abdullah F.

    Published 2023
    “…Almost all recently proposed testbed designed for FiWi are using hardware that lacks in programmability feature, making it challenging to implement any protocols and algorithms. …”
    Article
  10. 10

    Network tool for preventing DDOS attacks on cloud computing by Yo, Kee Seng

    Published 2015
    “…Cloud computing services are popular for its ease of use and dynamic scalability with great reliability feature. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11

    GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks by Al-Shugran, Mahmoud Ali

    Published 2014
    “…The Greedy Forwarding Strategy (GFS) has been the most used strategy in position-based routing protocols. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Automated feature extraction on brain MRI images for predicting multiple sclerosis patient disability by M. Muslim, Ali

    Published 2022
    “…Furthermore, they were using manual and semi-automated features extraction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Automated feature extraction for predicting multiple sclerosis patient disability using brain MRI by Muslim, Ali M., Mashohor, Syamsiah, Mahmud, Rozi, Al Gawwam, Gheyath, Hanafi, Marsyita

    Published 2022
    “…This study aims to predict MS patients' disability using fully automated feature extraction, single MRI scan, single MRI protocols and without patient follow-up. …”
    Get full text
    Get full text
    Article
  15. 15

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…The efficiency of EFS features is assessed in two ways: (1) by comparing them to the relevant related work’s features of outliers and flow using four feature importance methods, and (2) by analyzing the classification performance in the scenarios with and without EFS features. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Dynamic object replica placement using underlying routing protocols: ensuring the reliability by Waqas, Ahmad, Majeed, Nahdia, Muhammed Yusof, Zulkefli, Wahees Mahesar, Abdul

    Published 2013
    “…In this paper, it is discussed that reliability can be assured if we use replica placement algorithm along with the EIGRP (Enhanced Interior Gateway Routing Protocol). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18

    Brain Machine Interface Controlled Robot Chair by Hema Chengalvarayan, Radhakrishnamurthy

    Published 2010
    “…The BMI controls the joystick of the robot chair using a shared control algorithm. Real-time experiments are also presented using 10 trained and 5 untrained subjects to validate the applicability of the brain machine interface. …”
    Get full text
    Thesis
  19. 19
  20. 20