Search Results - (( using maximum detection algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- java simulation »
- using maximum »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
2
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
3
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
5
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
7
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Only one of these peak powers has the highest power, which is called global maximum power point (GMPP), and other peak powers are the local maximum power point (LMPP).The maximum power point tracking (MPPT) algorithms under PSCs can be categorized generally in two groups. …”
Get full text
Get full text
Thesis -
8
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
9
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
10
A novel algorithm to detect a QPSK signal with the minimum number of samples
Published 2015“…The algorithm was simulated and tested using ANSI C++. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Distance approximation using pivot point in narrow phase collision detection
Published 2013“…Thus, an algorithm for the optimal distance computation algorithm for continuous collision detection is shown in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
12
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…Due to the complexity of GMM, we use Expectation Maximization (or EM) algorithm by Dempster et al. (1977) to obtain the maximum likelihood estimates of the GMM parameters. …”
Get full text
Get full text
Get full text
Thesis -
13
Utilization of canny and velocity bunching algorithms for modelling shoreline change
Published 2006“…There is significant relationship between shoreline change rate estimated using Canny algorithm and ones modeled using velocity bunching model. …”
Get full text
Get full text
Conference or Workshop Item -
14
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
Get full text
Get full text
Thesis -
15
Formulation Of A Maximum Power Point Tracking (Mppt) Algorithm For Hydrokinetic Energy Harnessing
Published 2022“…This thesis is about a performance analysis based on Maximum Power Point Tracking (MPPT) algorithm generated by the hydrokinetic energy. …”
Get full text
Get full text
Undergraduates Project Papers -
16
-
17
New CFAR algorithm and circuit development for radar receiver
Published 2020“…The Maximum Spike Subtraction MSS-CFAR family that uses two lock circuits to find two maximum spikes in the CFAR window that subtracted from sample summing to make better background noise estimation that used to construct an adaptive threshold. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Modified perturb & observe maximum power point technique for solar photovoltaic systems
Published 2023“…By varying the step size of the perturbation in the traditional P&O algorithm, it can able to detect the maximum power point (MPP) in any situation, and it can be implemented with less cost while compared to the conventional models. …”
Article -
19
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
20
Square groove detection based on forstner with canny edge operator using laser vision sensor
Published 2023“…Specific me1hods must be used to process images. The objectives of 1his research are to develop a detection algorithm 1hat can extract 1he feature points of1he square-groove; and 1he second objective is to evaluate 1he detection algorithm and its ability to extract 1he image features of 1he square-groove in temis of 1he accuracy. …”
Get full text
Get full text
Get full text
Get full text
Thesis
