Search Results - (( software migration using algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- data normalization »
- migration using »
- using algorithm »
- java »
-
1
Elitist hybrid migrating birds optimization and genetic algorithm based strategy for T-way test suite generation
Published 2020“…Addressing the aforementioned issues, this research proposes the development and implementation of hybrid t-way strategy based Migrating Birds Optimization Algorithm (MBO) and Genetic Algorithm (GA) with elitism, termed Elitist Hybrid MBO-GA. …”
Get full text
Get full text
Thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
-
4
Clustering-based cloud migration strategies
Published 2018“…The k-means algorithm of the partitioning clustering method is used to analyze cloud migration strategies in this study. …”
Get full text
Get full text
Article -
5
Clustering-based cloud migration strategies
Published 2018“…The k-means algorithm of the partitioning clustering method is used to analyze cloud migration strategies in this study. …”
Get full text
Get full text
Article -
6
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
8
Improving oil palm fresh fruit bunch grading system via software and hardware modifications
Published 2016“…This problem is due to the size of the image captured which is 1Gb per image. Therefore, the algorithm was migrated to a standalone software using LabVIEW. …”
Get full text
Get full text
Thesis -
9
Classification model for water quality using machine learning techniques
Published 2015Get full text
Get full text
Article -
10
FuMAM: fuzzy-based mobile agent migration approach for data gathering in wireless sensor networks
Published 2018“…A mobile agent (MA) was recently proposed to provide an alternative solution for traditional data gathering in wireless sensor networks. An MA is a software component that can migrate among network nodes by following an assigned itinerary (or path). …”
Get full text
Get full text
Get full text
Article -
11
Solving Economic Dispatch Problems with Practical Constraints Utilizing Differential Search Algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
12
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…Dynamic VM consolidation leverages fine grained fluctuations in the application workloads, and continuously reallocates VMs using live migration to minimize the number of active physical nodes. …”
Get full text
Get full text
Thesis -
13
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Reliability-aware swarm based multi-objective optimization for controller placement in distributed SDN architecture
Published 2023“…The effectiveness of our hybrid RDMCP-PSO was then evaluated using extensive experiments and compared with other baseline algorithms. …”
Get full text
Get full text
Article -
16
Review on ubiquitous education system with multi-agent synchronization on mobile learning application environment
Published 2012“…The sync agent (Multi-agent system) proposed algorithm is based on the use of mobile agents which runs from the host (sender) computer and then migrates to the receiving (receiver) mobile computer to continue the process of updating learning contents before coming back to the sender for completing the process. …”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
19
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…The use of software-agent based middleware that is intelligent, enables the system to adapt to the ever changing in taste and preferences of users when predicting the buying intention, thus making the online marketing to be highly effective. …”
Get full text
Get full text
Conference or Workshop Item -
20
A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
