Search Results - (( java simulation optimization algorithm ) OR ( using multimedia techniques algorithm ))
Search alternatives:
- multimedia techniques »
- java simulation »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
2
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
3
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
5
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
7
A decision support system using Neurofuzzy algorithm methods in selecting lecturer's teaching work load for bachelor in multimedia / Asmaa Musa
Published 2007“…A large nimiber of techniques, such as Neurofuzzy algorithm methods are used to produce an efficient and effective system. …”
Get full text
Get full text
Thesis -
8
An overview of video encryption techniques
Published 2010Get full text
Get full text
Get full text
Article -
9
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
10
Design and implementation of multimedia digital matrix system
Published 2005“…The essential of multimedia support in M-DMS is high-speed digital interfacing technique. …”
Get full text
Get full text
Conference or Workshop Item -
11
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
12
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023“…Beam forming techniques have been proposed to increase the spectral efficiency of the wireless channel. …”
Conference paper -
13
A review on multimedia communications cryptography
Published 2011“…The classical techniques of data security are not appropriate for the current multimedia usage. …”
Get full text
Get full text
Get full text
Article -
14
Image Encrytion Using Block Based Transformation Algorithm
Published 2008“…Most of the available encryption algorithms are mainly used for textual data and may not be suitable for multimedia data such as images. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Suitability of using symmetric key to secure multimedia data: an overview,
Published 2010“…This study addresses the current algorithm of multimedia encryption schemes that have been proposed in the literature and description of multimedia security. …”
Get full text
Get full text
Get full text
Article -
17
Towards a unified image quality assessment technique for cross-content image processing applications
Published 2024“…It can reconstruct images with five distortion types, outperforming SOTA AS algorithms, even under high distortion. The first stage uses an application-specific reconstruction algorithm, while the second stage employs an IQA-based model called the observation-based bilateral filter (OBF) with non-linear weights calculated using a Haar-PSI-based maximum a posteriori (MAP) estimator. …”
Get full text
Thesis -
18
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…Through the algorithm, rule-based technique was used. Based on the experiment results, it is proved that the video content adaptation under e-learning environment can be achieved by the algorithms effectively.…”
Get full text
Get full text
Thesis -
19
Improved handoff call dropping probability (HCDP) in adaptive quality of service (AdQoS) in multimedia wireless networks using hierarchical cellular approach
Published 2003“…This paper proposes an improved handoff call dropping probability (HCDP) from an adaptive QoS (AdQoS) to support the QoS guarantee. Besides using an adaptive technique this method utilizes a hierarchical cellular approach with a bandwidth reallocation algorithm to determine the acceptance or rejection of a new call. …”
Get full text
Get full text
Conference or Workshop Item -
20
3D silhouette rendering algorithms using vectorisation technique from Kedah topography map
Published 2004Get full text
Get full text
Get full text
Conference or Workshop Item
