Search Results - data distribution ((control algorithm) OR (((based algorithm) OR (bat algorithm))))

Refine Results
  1. 1

    An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms by Ullah, Arif

    Published 2021
    “…Therefore, to overcome these problems, this study proposed an improved dynamic load balancing technique known as HBAC algorithm which dynamically allocates task by hybridizing Artificial Bee Colony (ABC) algorithm with Bat algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Levy Flight Safe Experimentation Dynamics Algorithm for Data-Based PID Tuning of Flexible Joint Robot by Mohd Ashraf, Ahmad, Mohd Helmi, Suid, Muhammad Ikram, Mohd Rashid, Mohd Zaidi, Mohd Tumari, M. H., Sulaiman

    Published 2020
    “…This paper proposes the data-based PID controller of flexible joint robot based on Levy Flight Safe Experimentation Dynamics (LFSED) algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Then, traffic is fitted to best traffic model and percentage level Policing and Shaping algorithm is developed to control the bandwidth used. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…The objective of this research is to characterize inbound internet traffic collected on real live IP-based campus network. Then, traffic is fitted to best traffic model and percentage level Policing and Shaping algorithm is developed to control the bandwidth used. …”
    Get full text
    Get full text
    Article
  5. 5

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Article
  7. 7

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…The proposed solution to this problem is based on a general combinatorial optimization algorithm known as Genetic Algorithm, and the load flow equations in distribution network. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An Optimized Binary Scheduling Controller for Microgrid Energy Management Considering Real Load Conditions by Mannan M., Roslan M.F., Reza M.S., Mansor M., Jern K.P., Hossain M.J., Hannan M.A.

    Published 2024
    “…This study presents an optimal schedule controller for microgrid energy management, utilizing the Binary Particle Swarm algorithm (BPSO) to minimize costs and ensure optimal power delivery to loads. …”
    Conference Paper
  10. 10

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…A data parallel algorithm (DPA-EHD) is designed and implemented for the EHD equations. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Topological Clustering via Adaptive Resonance Theory With Information Theoretic Learning by Masuyama, Naoki, Loo, Chu Kiong, Ishibuchi, Hisao, Kubota, Naoyuki, Nojima, Yusuke, Liu, Yiping

    Published 2019
    “…Other types of the ART-based topological clustering algorithms have been developed, however, these algorithms have various drawbacks such as a large number of parameters, sensitivity to noisy data. …”
    Get full text
    Get full text
    Article
  17. 17

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…In this research, Cuckoo Search Spring Algorithm (CSSA) is proposed to enhance the robustness of algorithm by constructing the optimal network reconfiguration consist of reducing power losses and improve voltage profile with the various loadability factor as the constraint according to load profile, based on single and multiobjective model. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…This thesis discusses about designs and develops techniques and algorithms for performing web access control. The major objective of the proposed technique referred to as a Secure Web Access Control (SWAC) is to provide mechanisms for control web access based on user access behavior. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20