Search Results - (( some operations process algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- operations process »
- process algorithm »
- some operations »
- java simulation »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
2
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
3
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
5
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
7
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
8
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
9
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…On top of that, new associated linear systems are developed based on the modified fuzzy multiplication arithmetic operators. The constructed algorithm is verified by presenting some numerical examples of two types of FFSME and also complex FFSME. …”
Get full text
Get full text
Monograph -
10
An adept edge detection algorithm for human knee osteoarthritis images
Published 2023“…Digital image processing comprises varieties of applications, where some of these used in medical image processing include convolution, edge detection as well as contrast enhancement. …”
Conference Paper -
11
Segmenting medical images using mathematical morphology and the improved watershed transform.
Published 2001“…It sounds important since the complex scene of this type of image resists any application for holding further image analysis. The algorithm consists of four processing stage i.e. gradient image, opening operation, watershed transform, and region merging. …”
Get full text
Get full text
Article -
12
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. …”
Get full text
Get full text
Thesis -
13
Development of a new algorithm for segmentation of flotation froth images
Published 2014“…It is well known that froth visual features reflect the operating conditions of the flotation process, so that being able to accurately obtain the froth properties is the most significant criteria to optimize and control this process. …”
Get full text
Get full text
Article -
14
Distributed generation allocation to reduce losses and improve voltage profile genetic algorithm: article
Published 2010“…Lead flow algorithm is combined appropriately with GA, till access to acceptable results of this operation. …”
Get full text
Get full text
Article -
15
Execution time optimization analysis on multiple algorithms performance of moving object edge detection
Published 2023“…Computer vision and digital image processing comprises varieties of applications, where some of these used in image processing include convolution, edge detection as well as contrast enhancement. …”
Conference paper -
16
Static hand gesture recognition using artificial neural network / Haitham Sabah Hasan
Published 2014“…In the pre-processing stage some operations are applied to extract the hand gesture from its background and prepare the hand gesture image for the feature extraction stage. …”
Get full text
Get full text
Thesis -
17
Machine learning in botda fibre sensor for distributed temperature measurement
Published 2023“…Additionally, temperature prediction accuracy and temperature measurement precision made by some of the chosen algorithms were comparable, and some were even better than LCF. …”
text::Thesis -
18
Mobile technology generations and cryptographic algorithms: analysis study
Published 2016“…At the same time, various mobile generations are susceptible to attack via eavesdropping and information leaking operations. Therefore, some cryptographic algorithms have proposed as confidentiality and integrity algorithms in different mobile generations, in order to prevent or mitigate these harmful operations. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…When such a block was detected, some of the standard processing steps may be skipped and some computation may be saved. …”
Get full text
Get full text
Thesis -
20
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…To fully utilize the performance potential of XTS mode of operation, a parallel design for the algorithm is proposed. …”
Get full text
Get full text
Thesis
