Search Results - (( knowledge network implementation algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  6. 6

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Static and self-scalable filter range selection algorithms for peer-to-peer networks by Kweh, Yeah Lun

    Published 2011
    “…For peer-to-peer networks, Loo (2005) selection algorithm has been selected as the benchmark as it is an established algorithm that claimed to be the best proposed for this network. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  10. 10

    Implementing universal priority DBA algorithm in PIC based EPON testbed by Radzi N.A.M., Din N.M., Al-Mansoori M.H., Majid M.S.A., Abdullah F.

    Published 2023
    “…Ethernet passive optical network (EPON) is becoming one of the best schemes in the broadband access network as it combines the Ethernet and passive optical network technology. …”
    Article
  11. 11

    Rogue access point detection and tracking system using trilateration algorithm by Lee, Chiew Min, Ang, Boon Keat, Kok, Ser Leen, Ghali, Abdulrahman Aminu, Sabri, Nor ‘Afifah

    Published 2023
    “…Besides, that the project introduces a robust method called trilateration algorithm. Therefore, the proposed trilateration algorithm if implemented will detect and reduce the risk of unauthorized network access in tertiary institutions and save the danger of financial loss. …”
    Get full text
    Get full text
    Book Section
  12. 12

    Bayesian Network Classifiers for Damage Detection in Engineering Material by Mohamed Addin, Addin Osman

    Published 2007
    “…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Multi-Backpropagation network by Wan Ishak, Wan Hussain, Siraj, Fadzilah, Othman, Abu Talib

    Published 2002
    “…The learning mechanism for Neural Network is its learning algorithm. Backpropagation (or backprop) algorithm is one of the well-known algorithms in neural networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm by Slamet, ., Izzeldin Ibrahim, Mohamed Abdelaziz

    Published 2022
    “…To describe data traffic passing through the network, a database of the network security layer (NSL) knowledge discovery in database (KDD) dataset is used. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Assessing the outcome of Competencies Level from Knowledge-Based Project by Sungsinlert, Anyamanee

    Published 2008
    “…This project is the new idea to implement the Knowledge Management by applying the concept of Knowledge Map and Social Network Map, which are the basic implementation of Knowledge Management, with Artificial Neural Network (ANN) Algorithm ofArtificial Intelligence System. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    A case study on quality of sleep and health using Bayesian networks by Hong , Choon Ong, Chiew , Seng Lee, Chye , Ching Sia

    Published 2012
    “…The network scores computation is implemented to estimate the fitting of the resulting network of each structural learning algorithm in order to choose the best-fitted network. …”
    Get full text
    Article
  18. 18

    Optimization of neural network architecture using genetic algorithm for load forecasting by Islam, B.U., Baharudin, Z., Raza, M.Q., Nallagownden, P.

    Published 2014
    “…In this paper, a computational intelligent technique genetic algorithm (GA) is implemented for the optimization of artificial neural network (ANN) architecture. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Logic Mining Approach: Shoppers’ Purchasing Data Extraction via Evolutionary Algorithm by Mohd Kasihmuddin, Mohd Shareduwan, Abdul Halim, Nur Shahira, Mohd Jamaludin, Siti Zulaikha, Mansor, Mohd. Asyraf, Alway, Alyaa, Zamri, Nur Ezlin, Azhar, Siti Aishah, Marsani, Muhammad Fadhil

    Published 2023
    “…In reducing the learning complexity, a genetic algorithm was implemented to optimize the logical rule throughout the learning phase in performing a 2-satisfiability-based reverse analysis method, implemented during the learning phase as this method was compared. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article