Search Results - (( program identification method algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  6. 6

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques by Ahmed Sabit, Hakilo

    Published 2006
    “…This research has produced filtered back concentration profiles of each flow regimes owing to the technique of neural network method of flow regime identification.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants by M, Irfan, N, Lukman, A. A, Alfauzi, J, Jumadi

    Published 2019
    “…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Simultaneous Network Reconfiguration and DG Sizing Using Evolutionary Programming and Genetic Algorithm to Minimize Power Losses by Dahalan, W.M., Mokhlis, Hazlie, Ahmad, R., Bakar, Ab Halim Abu, Musirin, I.

    Published 2014
    “…This paper presents an effective method based on Evolutionary Programming (EP) and Genetic Algorithm (GA) to identify the switching operation plan for feeder reconfiguration and distributed generation size simultaneously. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Monotone Data Samples Do Not Always Produce Monotone Fuzzy If- Then Rules: Learning with Ad hoc and System Identification Methods by Chin, Ying Teh, Tay, Kai Meng, Chee, Peng Lim

    Published 2017
    “…Besides that, a constrained non-linear programming method for FIS modelling is suggested, as a variant of the system identification method.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Fault location identification in power transmission networks: using novel nonintrusive fault-monitoring systems by Chang, Hsueh-Hsien, Yang, Chuan Choong, Lee, Wei-Jen

    Published 2021
    “…To examine and validate the proposed methodology, various fault types in a sample power system are simulated by using the electromagnetic transient program (EMTP). The simulation results reveal that the proposed methods demonstrate a high success rate of fault-location identification in power transmission networks for NIFM applications.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Biometrics: Facial Recognition by Ahmad Zohri, Wan Saarah Zuhri

    Published 2004
    “…It also lists the various approaches in handling facial recognition where we see different methods applied and opinions on which method is better and what factors influenced them. …”
    Get full text
    Get full text
    Final Year Project
  19. 19
  20. 20

    A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications by Far Chen, Jong

    Published 2025
    “…Validation against conventional methods and state-of-the-art algorithms confirmed the superior performance of the proposed approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis