Search Results - (( user computing based algorithm ) OR ( evolution optimization bat algorithm ))

Refine Results
  1. 1

    Multi-Swarm bat algorithm by Taha A.M., Chen S.-D., Mustapha A.

    Published 2023
    “…In this study a new Bat Algorithm (BA) based on multi-swarm technique called the Multi-Swarm Bat Algorithm (MSBA) is proposed to address the problem of premature convergence phenomenon. …”
    Article
  2. 2

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…Basically, the QEEA is based on the Time Domain (TD) and Frequency Domain (FD) scheduling where it is dependent on the QoS requirements to allocate resources. The proposed algorithm is compared against other scheduling algorithms, namely, the Channel and QoS Aware (CQA), Priority Set Scheduler (PSS), Proportional Fair (PF), Maximum Throughput (MT) and Blind Average Throughput (BAT). …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing by Naha, Ranesh Kumar

    Published 2015
    “…It helps organization to reduce computing infrastructure cost. Incloud computing concept, cloud users can use computing resources according to their needs and requirements. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Relationship based replication algorithm for data grid by Yusof, Yuhanis

    Published 2014
    “…Such an approach overcomes existing algorithms that is based either on users request or resource capabilities as an individual. …”
    Get full text
    Get full text
    Monograph
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms by Ullah, Arif

    Published 2021
    “…The proposed HBAC showed an improved accuracy rate in task distribution and reduced the makespan of VM in a cloud data center. Based on the ANOVA comparison test results, a 1.25 percent improvement on accuracy and 0.98 percent reduced makespan on task allocation system of VM in cloud computing is observed with the proposed HBAC algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar by Bakhtiar, Badariyah

    Published 2007
    “…Through the algorithm, rule-based technique was used. Based on the experiment results, it is proved that the video content adaptation under e-learning environment can be achieved by the algorithms effectively.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Making location-aware computing working accurately in smart spaces by Mantoro, Teddy, Ayu, Media Anugerah, Weyn, Maarten

    Published 2011
    “…The algorithm is based on “multiple observers” on ηk-Nearest Neighbour. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  17. 17

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media A., Abu Osman, Md. Tap

    Published 2011
    “…Originality/value – A new computational intelligence modeling scheme, based on the ELM has been investigated, developed and implemented, as an efficient and more accurate predictive solution for determining position of mobile users based on location fingerprint data (SS and SQ).…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Password-based authentication is considered the cheapest and most popular and commonly used methods of computer authentication. …”
    text::Thesis
  19. 19

    Using the evolutionary mating algorithm for optimizing the user comfort and energy consumption in smart building by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2023
    “…To address the optimization problem, the Evolutionary Mating Algorithm (EMA) is proposed. EMA belongs to the evolutionary computation group of nature-inspired metaheuristic algorithms and offers a promising solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…The design of the proposed framework involves haptic texture rendering algorithm and query algorithm. The proposed framework integrates computer haptic and content based image retrieval (CBIR) where haptic texture rendering is performed based on extracted cloth data. …”
    Get full text
    Get full text
    Thesis