Search Results - (( java simulation optimization algorithm ) OR ( data transformation based algorithm ))

Refine Results
  1. 1
  2. 2

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Image Encrytion Using Block Based Transformation Algorithm by Bani Younes, Mohammad Ali, Jantan, Aman

    Published 2008
    “…In this paper, we introduce a block-based transformation algorithm based on the combination of image transformation and a well known encryption and decryption algorithm called Blowfish. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  6. 6

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Clustering Spatial Data Using a Kernel-Based Algorithm by Awan, A. Majid, Md. Sap, Mohd. Noor

    Published 2005
    “…Therefore, this work comes up with new clustering algorithm using kernel-based methods for effective and efficient data analysis by exploring structures in the data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title by Khalaf, Emad Taha

    Published 2019
    “…It uses a weighted K-means clustering algorithm based on the improved FA to optimize the initial clustering centers of K-means algorithm, known as Weighted K-means clustering-Improved Firefly Algorithm (WKIFA). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Classification of fault and stray gassing in transformer by using duval pentagon and machine learning algorithms by Haw, Jia Yong, Mohd Yousof, Mohd Fairouz, Abd Rahman, Rahisham, Talib, Mohd Aizam, Azis, Norhafiz

    Published 2022
    “…However, there are times where the produce of stray gassing event might lead to fault indication in the transformer. Machine learning algorithms are used to classify the DGA data into normal condition and corresponding faults based on IEEE limits and Duval pentagon method. …”
    Get full text
    Get full text
    Article
  13. 13

    Spatial Clustering Algorithm for Time Series Rainfall Data Using X-Means Data Splitting by Ali, Noor Rasidah, Ku Mahamud, Ku Ruhana

    Published 2017
    “…The proposed algorithm is compared with five types of data transformation techniques, namely mean and median in monthly data and the rest is in daily data such as binary, cumulative and actual values.Results indicate that data transformation using X-means data splitting in hierarchical clustering outperformed other transformation techniques and more consistent between training and testing datasets based on similarity measures.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Supervised deep learning algorithms for process fault detection and diagnosis under different temporal subsequence length of process data by Terence Chia Yi Kai, Agus Saptoro, Zulfan Adi Putra, King Hann Lim, Wan Sieng Yeo, Jaka Sunarso

    Published 2025
    “…Industrial process time series data could be processed with ease by deep learning algorithms, particularly transformer-based models because of their multi-head attention mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai, Asrani, Lit, Maimun Binti, Huja Hussin, Mohamad Faizrizwan bin, Mohd Sabri

    Published 2022
    “…Several cryptographic SHA-256 hash algorithms have been developed to enhance the performance of data-protection techniques. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  17. 17

    Analysis of multiexponential transient signals using interpolation-based deconvolution and parametric modeling techniques by Salami, Momoh Jimoh Eyiomika, Ismail, Z.

    Published 2003
    “…Direct deconvolution approach often leads to poor resolution of ihe estimated decay rates since the fast Fourier transform (FFT) algorithm is used to analyze the resulting deconvolved data. …”
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…Signal processing is an important tool to analyse non-stationary and non linear data. Many techniques of analysis are available to process non stationary and non-linear data such as FFT, wavelets transform, and demodulation analysis. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Semi-automatic oil palm tree counting from pleiades satellite imagery and airborne LiDAR / Nurul Syafiqah Khalid by Khalid, Nurul Syafiqah

    Published 2020
    “…For the methodology of this study, object-based image analysis (OBIA), watershed transformation segmentation and local maxima algorithm are applied. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis