Search Results - (( user evaluation method algorithm ) OR ( time simulation based algorithm ))*
Search alternatives:
- method algorithm »
- simulation based »
- user evaluation »
- time simulation »
-
1
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The four prime aspects of this work are: firstly, a model of the grid scheduling problem for dynamic grid computing environment; secondly, development of a new web based simulator (SyedWSim), enabling the grid users to conduct a statistical analysis of grid workload traces and provides a realistic basis for experimentation in resource allocation and job scheduling algorithms on a grid; thirdly, proposal of a new grid resource allocation method of optimal computational cost using synthetic and real workload traces with respect to other allocation methods; and finally, proposal of some new job scheduling algorithms of optimal performance considering parameters like waiting time, turnaround time, response time, bounded slowdown, completion time and stretch time. …”
Get full text
Get full text
Thesis -
2
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…The results showed that the parallel algorithms for EHD simulations may provide 4 to 5 times more speedup over sequential algorithm for large grid sizes. …”
Get full text
Get full text
Thesis -
3
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…The dataset development for both algorithms is carried out via simulations in Graphical Network Simulator 3 (GNS3). …”
text::Thesis -
4
PID TUNING OF DC MOTOR USING SWARM ITELLIGENCE ALGORITHM
Published 2012“…In this project, Particle Swarm Optimization (PSO) as one of Swarm Intelligence Algorithm based has proposed to be integrated with PID (Proportional, Integral, Derivative) Controller in order to achieve optimal tuning method. …”
Get full text
Get full text
Final Year Project -
5
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article -
6
Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony
Published 2022“…During the methodology chapter, a comprehensive investigation has been done to ascertain the proposed method that can be adopted such as algorithms involved, project flow, and simulation. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
Get full text
Get full text
Thesis -
8
Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam
Published 2017“…Next, four recently introduced optimization algorithms are employed as feature selector, namely as 1) angle modulated simulated Kalman filter (AMSKF), 2) binary simulated Kalman filter (BSKF), 3) local optimum distance evaluated simulated Kalman filter (LocalDESKF), and 4) global optimum distance evaluated simulated Kalman filter (GlobalDESKF). …”
Get full text
Get full text
Get full text
Thesis -
9
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The major objective for this project is to re-implement the proposed Energy Topology DRAND (E-T-DRAND) algorithm in IoT WSN using time slot allocation method and allocate nodes together with the node energy information and compare the obtained results with the corresponding results in the base paper. …”
Get full text
Get full text
Thesis -
10
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
11
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
12
Performance Comparison of Nature-inspired Optimization Algorithms Applied to MVDR Technique for Canceling Multiple Access Interference Signals
Published 2018“…Methods/Analysis: In this work, two nature-inspired optimization methods, namely Particle Swarm Optimization (PSO) and Gravitational Search Algorithm (GSA) are applied to enhancing the conventional MVDR performance. …”
Get full text
Get full text
Get full text
Article -
13
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Password-based authentication is considered the cheapest and most popular and commonly used methods of computer authentication. …”
text::Thesis -
14
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The issue of misplaced pixel positions in the image was also adequately addressed, making it an effective method for image encryption. The hybrid technique was simulated on image data and evaluated to gauge its performance. …”
Get full text
Get full text
Get full text
Article -
15
Parallel system for abnormal cell growth prediction based on fast numerical simulation
Published 2010“…The discretization of multi-dimensional partial differential equation (PDE) is based on finite difference method. The predictor system depending on users input data via a user interface, generating the initial and boundary condition generated from parabolic or elliptic type of PDE. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian
Published 2009“…Location positioning method chosen in L-SH is Observed-Time Difference of Arrival (OTDOA). Simulation model is developed and done using Matlab® in analyzing and comparing the performance of conventional handoff with L-SH. …”
Get full text
Get full text
Research Reports -
17
Smart Routing For Solid Waste Collection
Published 2023“…The algorithm will be evaluated through simulations and field testing in a residential area in Kuching. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Application of Neural Network in User Authentication for Smart Home System
Published 2009“…As a result, a password-based user authentication system for smart home by using neural network had been developed successfully.…”
Get full text
Get full text
Get full text
Article -
19
User authentication using neural network in smart home
Published 2009“…Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
GSM-WCDMA hybrid localization techniques in multilayer heterogeneous network / Muhammad Naqiuddin Hassan
Published 2013“…The proposed method has been implemented and evaluated using simulation on MATLAB software under various mobility models. …”
Get full text
Get full text
Thesis
