Search Results - (( its application need algorithm ) OR ( _ application ((cloud algorithm) OR (bat algorithm)) ))
Search alternatives:
- application need »
- cloud algorithm »
- need algorithm »
- bat algorithm »
-
1
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…Three different optimization algorithms which are Bat Algorithm (BA), Bat Algorithm with Mutation (BAM) and Extended Bat Algorithm (EBA) are implemented to optimize the value of PID controller gain for wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
3
PID controller design for mobile robot using Bat Algorithm with Mutation (BAM)
Published 2019“…Here, an optimization algorithm called Bat Algorithm with Mutation (BAM) is proposed to optimize the value of PID controller gain for mobile robot. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Impatient task mapping in elastic cloud using genetic algorithm
Published 2011Get full text
Get full text
Get full text
Article -
5
Task scheduling in cloud computing using Harris-Hawk Optimization
Published 2024“…In this study, the proposed HHO algorithm is simulated and compared with other well-known swarm intelligence algorithms, including Bat Algorithm (BA), Grey Wolf Optimization (GWO), and Particle Swarm Optimization (PSO). …”
Get full text
Get full text
Get full text
Proceedings -
6
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…The genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
Impatient job scheduling under cloud computing
Published 2012“…The first part focuses on review- ing the previous immediate mode scheduling and adopting them on cloud paradigm. The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
8
-
9
Assessing Bat Roosts Using the LiDAR System at Wind Cave Nature Reserve in Sarawak, Malaysian Borneo
Published 2017“…Bats that roost in large clusters, specifically Penthetor lucasi were determined through automated counting using connected components labelling, a graph theory algorithm mostly used in image analysis applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
12
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…The proposed algorithm is evaluated via computer simulation and modeling where its performance is verified against the few selected algorithms of the same nature. …”
Get full text
Get full text
Get full text
Article -
13
-
14
IOT-based fertigation system / Mohamad Amir Furqan Darus
Published 2024“…These sensors provide real-time data about the crops’ environment, which is then sent to a central hub or cloud platform. Advanced algorithms and machine learning processes this data to determine the ideal irrigation and fertilization needs. …”
Get full text
Get full text
Student Project -
15
Genetic algorithm optimized receiver-oriented packet clustering in multi-buffer network card
Published 2016“…Its optimization factors revolve around the number of buffers, the number of applications that need access to the clusters, capacity of each buffer, transmission size, packet size, and number of packets. …”
Get full text
Get full text
Article -
16
Secure lightweight client for cloud-based E-Health Model
Published 2023“…The implementation of the four features is described as follows: Firstly, the SCBEH model, which optimized a MONA benchmark model and absorbed all its security technologies, has four aspects to be considered: 1) the use of symmetric and asymmetric hybrid encryption technique (KEM-DEM), in which the latest elliptic curve cryptography algorithm (ECC) of asymmetric encryption is used; 2) the applications of group key distribution and group signature technologies are achieved; 3) the revocation and tracking of illegal group members are reimplemented; 4) the computational burden of client is alleviated. …”
Get full text
Get full text
Get full text
Thesis -
17
Congestion control in vehicular adhoc network: A survey
Published 2019“…Reliable congestion control (CC) are necessary to provide effectient dissemination of time-critical safety messages in VANET applications; safety and non-safety applications. In this paper, we present the overview on VANET, its application and challenges. …”
Get full text
Get full text
Get full text
Article -
18
Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system
Published 2018“…Stereo algorithm consists of camera calibration, stereo mapping (or disparity mapping) and 3D point cloud data. …”
Get full text
Get full text
Thesis -
19
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
Published 2020“…Although all of the objectives had been achieved the current system restricted user to make changes on the calculated route directly, the clustering algorithm and the route optimization algorithm applied are not wise enough and several enhancements can be made for this system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Evaluation of cloud 3D printing services oriented toward the product life cycle based on a triangular fuzzy number complementary judgment matrix
Published 2024“…This methodological innovation underscores its practical feasibility and effectiveness in real-world applications. …”
Get full text
Get full text
Get full text
Article
