Search Results - (( user evaluation method algorithm ) OR ( time simulation based algorithm ))*

Refine Results
  1. 1

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…The four prime aspects of this work are: firstly, a model of the grid scheduling problem for dynamic grid computing environment; secondly, development of a new web based simulator (SyedWSim), enabling the grid users to conduct a statistical analysis of grid workload traces and provides a realistic basis for experimentation in resource allocation and job scheduling algorithms on a grid; thirdly, proposal of a new grid resource allocation method of optimal computational cost using synthetic and real workload traces with respect to other allocation methods; and finally, proposal of some new job scheduling algorithms of optimal performance considering parameters like waiting time, turnaround time, response time, bounded slowdown, completion time and stretch time. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…The results showed that the parallel algorithms for EHD simulations may provide 4 to 5 times more speedup over sequential algorithm for large grid sizes. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…The dataset development for both algorithms is carried out via simulations in Graphical Network Simulator 3 (GNS3). …”
    text::Thesis
  4. 4

    PID TUNING OF DC MOTOR USING SWARM ITELLIGENCE ALGORITHM by Hasdi Aimon, Arhimny

    Published 2012
    “…In this project, Particle Swarm Optimization (PSO) as one of Swarm Intelligence Algorithm based has proposed to be integrated with PID (Proportional, Integral, Derivative) Controller in order to achieve optimal tuning method. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review by Al-Qadhi, Abdulrahman K., Latip, Rohaya, Chiong, Raymond, Athauda, Rukshan, Hussin, Masnida

    Published 2025
    “…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony by Mohd Izuddin Sipluk

    Published 2022
    “…During the methodology chapter, a comprehensive investigation has been done to ascertain the proposed method that can be adopted such as algorithms involved, project flow, and simulation. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman by Azman, Alya Kauthar

    Published 2025
    “…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam by Asrul, Adam

    Published 2017
    “…Next, four recently introduced optimization algorithms are employed as feature selector, namely as 1) angle modulated simulated Kalman filter (AMSKF), 2) binary simulated Kalman filter (BSKF), 3) local optimum distance evaluated simulated Kalman filter (LocalDESKF), and 4) global optimum distance evaluated simulated Kalman filter (GlobalDESKF). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    TDMA scheduling analysis of energy consumption for iot wireless sensor network by Islam, Md Ashikul

    Published 2019
    “…The major objective for this project is to re-implement the proposed Energy Topology DRAND (E-T-DRAND) algorithm in IoT WSN using time slot allocation method and allocate nodes together with the node energy information and compare the obtained results with the corresponding results in the base paper. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Performance Comparison of Nature-inspired Optimization Algorithms Applied to MVDR Technique for Canceling Multiple Access Interference Signals by Suhail Najm, Shahab, Ayib Rosdi, Zainun, Nurul Hazlina, Noordin, Izzeldin, I. Mohd

    Published 2018
    “…Methods/Analysis: In this work, two nature-inspired optimization methods, namely Particle Swarm Optimization (PSO) and Gravitational Search Algorithm (GSA) are applied to enhancing the conventional MVDR performance. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Password-based authentication is considered the cheapest and most popular and commonly used methods of computer authentication. …”
    text::Thesis
  14. 14

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…The issue of misplaced pixel positions in the image was also adequately addressed, making it an effective method for image encryption. The hybrid technique was simulated on image data and evaluated to gauge its performance. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Parallel system for abnormal cell growth prediction based on fast numerical simulation by Alias, Norma, Islam, Md. Rajibul, Shahir, Rosdiana, Hamzah, Norhafizah, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Ludin, Eliana, Azami, Masrin

    Published 2010
    “…The discretization of multi-dimensional partial differential equation (PDE) is based on finite difference method. The predictor system depending on users input data via a user interface, generating the initial and boundary condition generated from parabolic or elliptic type of PDE. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian by Ali, Azuwa, Salian, Saiful Fadzli

    Published 2009
    “…Location positioning method chosen in L-SH is Observed-Time Difference of Arrival (OTDOA). Simulation model is developed and done using Matlab® in analyzing and comparing the performance of conventional handoff with L-SH. …”
    Get full text
    Get full text
    Research Reports
  17. 17

    Smart Routing For Solid Waste Collection by Ngiam, John Tze

    Published 2023
    “…The algorithm will be evaluated through simulations and field testing in a residential area in Kuching. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Application of Neural Network in User Authentication for Smart Home System by Joseph, A., David Bong, Boon Liang, Dayang Azra, Awang Mat

    Published 2009
    “…As a result, a password-based user authentication system for smart home by using neural network had been developed successfully.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    User authentication using neural network in smart home by Jee,, Tze Ling

    Published 2009
    “…Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  20. 20

    GSM-WCDMA hybrid localization techniques in multilayer heterogeneous network / Muhammad Naqiuddin Hassan by Hassan, Muhammad Naqiuddin

    Published 2013
    “…The proposed method has been implemented and evaluated using simulation on MATLAB software under various mobility models. …”
    Get full text
    Get full text
    Thesis