Search Results - (( data virtualization based algorithm ) OR ( data normalization path algorithm ))
Search alternatives:
- virtualization based »
- data virtualization »
- data normalization »
- normalization path »
- path algorithm »
-
1
Wide area measurement system in the IEEE-14 bus system using multiobjective shortest path algorithm for fault analysis
Published 2021“…The distances of the normal path (without simulated fault) and the new path (with simulated fault) were recorded. …”
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Improved Dynamic Ant Colony System (DACS) on Symmetric Traveling Salesman Problem (TSP).
Published 2007“…Their ability as a colony to find paths or routes to the food sources has inspired the development of an algorithm namely Ant Colony System (ACS). …”
Get full text
Get full text
Conference or Workshop Item -
5
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…Based on the proposed algorithms, energy consumption can be reduced…”
Get full text
Get full text
Get full text
Article -
6
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…The proposed HBAC algorithm was tested and compared with other stateof-the-art algorithms on 200 to 2000 even tasks by using CloudSim on standard workload format (SWF) data sets file size (200kb and 400kb). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Improving Network Consistency and Data Availability Using Fuzzy C Mean Clustering Algorithm in Wireless Sensor Networks
Published 2024thesis::doctoral thesis -
8
-
9
-
10
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
11
Enhancing hyperparameters of LSTM network models through genetic algorithm for virtual learning environment prediction
Published 2025“…Genetic algorithms for hyperparameter optimization significantly contributed, with the GA + LSTM + ADAGRAD model achieving 88% and 87% accuracy in the 7th and 9th models for BBB course data. …”
Get full text
Get full text
Get full text
Article -
12
Performance analysis of constrained device virtualization algorithm
Published 2020“…We have adopted this technique in our research to virtualize the entire Internet of Things network so that virtual TCP/IP based protocols can operate on virtual networks for enabling interoperability. …”
Get full text
Get full text
Get full text
Article -
13
Impatient job scheduling under cloud computing
Published 2012“…The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
14
-
15
Intelligent motion planning of a mobile robot by using convolutional neural network / Siti Asmah Abdullah
Published 2019“…By the path reference created by A* algorithm the robot is capable in optimizing its path to reach the designated destination. …”
Get full text
Get full text
Get full text
Thesis -
16
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…As for this study, virtual area based is been used which applied to bathymetry data set that has been collected by using R2 Sonic 2020. …”
Get full text
Get full text
Thesis -
17
Energy efficient virtual machine provisioning in cloud data centers
Published 2014Get full text
Get full text
Conference or Workshop Item -
18
-
19
-
20
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Get full text
Article
